JPCERT/CC Internet Threat Monitoring Report [January 1, 2019 ~ March 31 , 2019]
ZXHN H108N have port 52869 open · Issue #650 · threat9/routersploit · GitHub
Masafumi Negishi on Twitter: "Another moobot variant has been scanning 9530/tcp since May 25, mostly infected in Japan. The threat actor exploited CVE-2014-8361 on 52869/tcp. Many home routers in Japan remain vulnerable
What is Shodan? Diving into the Google of IoT Devices
ZXHN H108N have port 52869 open · Issue #650 · threat9/routersploit · GitHub
Art of Steal: Satori Variant is Robbing ETH BitCoin by Replacing Wallet Address