Worm - IP address observed attempting to bruteforce SSH server credentials.

Re: https://viz.greynoise.io/ip/178.62.48.191
For IP: https://www.shodan.io/host/178.62.48.191 see vulnerabilities.

High Risk Site: https://www.magereport.com/scan/?s=https://www.alyaka.com/eu/

See: https://aw-snap.info/file-viewer/?protocol=secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=d3d3LnxseXxrfC5eXW1ge3U%3D~enc
Web Hint Linting results: https://webhint.io/scanner/2803fc87-7bc8-4547-8857-c75b9a543aff
Consider here: https://www.shodan.io/host/104.28.2.101

Retire.js detected:
jquery 1.12.4 Found in -https://www.alyaka.com/js/alyaka/jquery/jquery.min.js
Vulnerability info:
Medium 2432 3rd party CORS request may execute CVE-2015-9251
Medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers
Low CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution & error on main page → ReferenceError: UET is not defined /eu/:4180

polonus (volunteer 3rd party cold recon wevbsite security analyst and website error-hunter)