Кккпопробуй провалиться под другими пассами на эти IP . если пускает значит нарвался на ханипот ) тож частенько такое вижу
дава ещеВалидные SSH доступы с нестандартными портами2222, :2223, :8022 итд)
Скрытое содержимое
will try them soon1.6.10.131 | admin | admin
1.6.4.209 | admin | admin
1.6.4.208 | admin | admin
1.6.11.97 | admin | admin
1.6.11.70 | admin | admin
1.23.165.158 | ubnt | ubnt
1.6.10.81 | admin | admin
1.6.132.51 | admin | admin
1.6.138.119 | admin | admin
1.6.138.121 | admin | admin
1.6.141.219 | admin | admin
1.6.141.226 | admin | admin
1.6.144.82 | admin | admin
27.106.6.34 | ubnt | ubnt
27.106.14.10 | ubnt | ubnt
27.106.15.174 | ubnt | ubnt
give a thumbs up if you like it ..![]()
Another forum's thread:
#1
username1 commented
1 day ago
I was developing a simple API integration with Pastebin and I found a paste with some credentials. I tested them and it looks like some kind of HMI at 88.26.254.22:5900 (gonsalpe-operador:OUSTicHolDes). I’d never messed around with OT stuff but it was interesting
#2
username2 commented
23 hours ago
Yeah, username1. Creds totally work. I’ve dug a bit into the hostname and other keywords I could find on the net and it looks something related to the Spanish electrical company “Red Electrica Espanola”. Get away from there, governments involved...
#3
username1 commented
23 hours ago
LOL, thanks username2 ! I’d never think that a simple Pastebin script could find such a big rabithole hehe
Look what I've seen on another forum:
I've accessed using those credentials and yes those credentials are working. Enjoy it![]()
where is this?
+ root