Event #20936
Recorded 4 weeks ago
Command
Critical
default-host
140.82.46.49
209.6.216.95
root
Nov 26, 2025 20:29:12
Command
docker exec azuracast sh -c 'mariadb -u azuracast -pREffKmptM662 azuracast -e "SELECT id, timestamp, identifier, changes, user FROM audit_log WHERE changes LIKE "%allowed_ips%" AND changes NOT LIKE "%\"allowed_ips\":null%" ORDER BY timestamp DESC LIMIT 20;"' 2>&1 < /dev/null
Raw Event Data
{
"pid": 3227831,
"tty": "\/dev\/pts\/0",
"ppid": 3095478,
"user": "root",
"shell": "\/bin\/bash",
"command": "docker exec azuracast sh -c 'mariadb -u azuracast -pREffKmptM662 azuracast -e \"SELECT id, timestamp, identifier, changes, user FROM audit_log WHERE changes LIKE \"%allowed_ips%\" AND changes NOT LIKE \"%\\\"allowed_ips\\\":null%\" ORDER BY timestamp DESC LIMIT 20;\"' 2>&1 < \/dev\/null",
"user_ip": "209.6.216.95",
"exit_code": 0,
"server_ip": "140.82.46.49",
"timestamp": "2025-11-26T20:29:12.905Z",
"event_type": "command",
"received_at": "2025-11-26T20:29:13.293029",
"server_name": "Azura3",
"honeypot_name": "Azura3",
"parent_command": "claude",
"ssh_connection": "209.6.216.95 52990 140.82.46.49 22",
"server_location": "NJ",
"honeypot_location": "NJ",
"working_directory": "\/root"
}
Risk Assessment
High Risk
Critical severity event detected
Actions
Related Events
Related events feature coming soon