Nope, none of those ips are mine. Looks like it’s trying to connect to different servers but seems to fail. It was a stock image used from berry boot and updated through apt-get. I did have an open port on my router to acess it away from the house. I was previously running raspberry stretch and realized I was unable to load retropie on it (well easily anyways) so I did a fresh install and left the port open without changing the password before setting up roms first.. I forgot the port was open as on the stretch I changed the password and user already. So I’m assuming someone is rolling through ips on port 22 and default user and passwords seeing what they can connect to. I’m curious as to what was involved in this malware if that was the case.
Contributions to the project are always appreciated, so if you would like to support us with a donation you can do so here.
Hosting provided by Mythic-Beasts. See the Hosting Information page for more information.