Event #24551
Recorded 3 weeks ago
Command
Critical
default-host
140.82.46.49
66.135.25.80
root
Dec 2, 2025 00:07:57
Command
docker exec azuracast mariadb -u azuracast -pREffKmptM662 azuracast -e "
-- Find suspicious IPs with high connection counts since Nov 28 (after blocking)
-- Excluding the known 3 datacenter IPs
SELECT
listener_ip,
COUNT(*) as connections,
device_client,
device_is_bot,
MIN(timestamp_start) as first_seen,
MAX(timestamp_start) as last_seen
FROM listener
WHERE timestamp_start >= '2025-11-28'
AND listener_ip NOT IN ('139.144.98.180', '144.76.223.55')
GROUP BY listener_ip, device_client, device_is_bot
HAVING connections > 50
ORDER BY connections DESC
LIMIT 20;
"
Raw Event Data
{
"pid": 3180014,
"tty": "unknown",
"ppid": 3179983,
"user": "root",
"shell": "\/bin\/bash",
"command": "docker exec azuracast mariadb -u azuracast -pREffKmptM662 azuracast -e \"\n-- Find suspicious IPs with high connection counts since Nov 28 (after blocking)\n-- Excluding the known 3 datacenter IPs\nSELECT \n listener_ip,\n COUNT(*) as connections,\n device_client,\n device_is_bot,\n MIN(timestamp_start) as first_seen,\n MAX(timestamp_start) as last_seen\nFROM listener\nWHERE timestamp_start >= '2025-11-28'\nAND listener_ip NOT IN ('139.144.98.180', '144.76.223.55')\nGROUP BY listener_ip, device_client, device_is_bot\nHAVING connections > 50\nORDER BY connections DESC\nLIMIT 20;\n\"",
"user_ip": "66.135.25.80",
"exit_code": 0,
"server_ip": "140.82.46.49",
"timestamp": "2025-12-02T00:07:57.888Z",
"event_type": "command",
"received_at": "2025-12-02T00:07:58.141497",
"server_name": "Azura3",
"honeypot_name": "Azura3",
"parent_command": "sshd",
"ssh_connection": "66.135.25.80 43146 140.82.46.49 22",
"server_location": "NJ",
"honeypot_location": "NJ",
"working_directory": "\/root"
}
Risk Assessment
High Risk
Critical severity event detected
Actions
Related Events
Related events feature coming soon