ports open by design // packets caught // bundles published // defenders ready //

Honeypot overview

Suricata Network IDS.

Network Intrusion Detection System (IDS) monitoring traffic for malicious signatures. Indicators flow straight from the OTX STIX export, while Robert AI writes the monthly breakdown so you can brief stakeholders with specifics that matter.

Location: AustraliaProtocol: Suricata / Network IDSMonth: November 2025

NadSec Honeypot

Suricata IDS

Everything here is malicious on purpose. No production data.

Live

Data source

T-Pot CE

Raw logs to STIX to OTX pulse.

Report author

Robert AI

Summaries and snark only.

Snapshot

November 2025 Pulse

Quick stats parsed from the current month STIX export.

Monthly pulse

Unique IP indicators

0

Distinct source IPs in the STIX bundle.

Hash indicators

0

File hashes associated with IDS activity.

Indicator objects

0

Total STIX indicator objects.

Signal strength

0

Plenty of brute-force automation; little human hands.

Scope

IDS Alerts

Signals come strictly from the Suricata IDS STIX bundle.

What to do

Block & Investigate

Use IPs and hashes for blocking or enrichment. Check payloads for context.

Caveats

False Positives Possible

Tune to your risk appetite before auto-blocking anything in prod. Need help implementing? NadTech Support can assist.

Monthly report

Robert's November 2025 brief

Generated by Robert AI

Suricata → High & Medium Alert IPs – Australia – November 2025

Executive Summary

Ah, November. While most were busy stocking up on holiday cheer, some shady characters were on a different mission. During this jolly period, the Suricata IDS (T-Pot Sydney) decided to play Grinch and caught hordes of dubious IPs, up to no good across Australia. From attempts to play superuser to dubious downloads that your mother warned you about, the month's activity was an eyebrow-raiser. All signs point to Mirai-style botnets throwing a party we weren't invited to, hosted thanks to some accommodating ISPs around the globe.

Key Stats

  • Timeframe: November 2025
  • Sensor: Suricata IDS (T-Pot Sydney)
  • Volume: Hundreds of attempts targeting IoT devices, with a heavy hand on admin privilege exploitation.
  • Noteworthy ASNs & Infra:
    • Data Communication Business Group (ASN: 3462)
    • DigitalOcean (ASN: 14061)
    • Hurricane Electric (ASN: 6939)
    • Contabo GmbH (ASN: 51167)
    • RailTel Corporation of India Ltd (ASN: 24186)

Campaign Narrative

The plot's as thick as grandma's stew—various actors squatted on a mix of half-respectable cloud hosts and questionable backstreets of the internet. While most folks were worrying about stuffing turkeys, this crowd was more into stuffing admin creds and POST requests into unsuspecting devices. The activity smells distinctly of opportunism, the kind you wouldn't clap for in a sitcom.

Infrastructure Details

Oh, hosting providers, the Robin Hoods of our story—if Robin Hood decided to rob the rich and give to... malware-spewing botnets. This month, DigitalOcean and Hurricane Electric were headliners, hosting malware that makes your average crimeware look downright pedestrian. Contabo and RailTel weren't far behind, supporting a delightful array of scanning hosts channelling their inner Mirai.

Bulletproof hosts were rolling out the digital red carpet, laced with late-night IOT downloader traffic. Meanwhile, Datacamp Limited made a cameo appearance, potentially catering to the more "research-oriented" neighbours, bless their proactive hearts.

Malware and Behaviour

Meet the cast: a medley of vulnerabilities and dubious JavaScript antics, from VXWORKS Urgent11 championship exploits to the ever-so-stylish CVE-2020-11900. It's all about forcing admin privileges through the window while legitimate configs take the front door. These actors love nothing more than IoT malware slathered in POST request sauce—a favourite recipe of the so-helpfully-detailed crimeware cookbook.

Detection and Mitigation

  • Firewall Efficacy: Consider putting the screws on those pesky ports like 8080 and 49152. If it sounds unfamiliar and feels a tad Mirai-esque, lock it up.

  • Intelligent Log Focus: Time to stop relying on wishful thinking. Glance over the logs for anomalies, particularly attempted privilege escalations and unexpected device chatter.

  • Prioritise Patch Management: Patch. Everything. Yesterday. Those CVEs won't fix themselves, and nothing ruins a hacker's day more than fully updated firmware.

  • Quarantine Measures: Isolate infected IoT devices faster than you’d dive for the last slice of cake at a party. Trust me, your network will thank you.

Closing Thoughts

As we head into December, let's hope the gift of knowledge and mitigation keeps the malware bah-humbug down. Yes, it's another campaign from the depths of the internet's less charming neighbourhoods, but chin up. With the right mix of monitoring, patching, and slightly paranoid vigilance, you can tell these malefactors to “do one” until the new year and beyond.

Stay watchful, be grumpy, and may your networks remain unbreached!

STIX indicators

OTX pulse export

Parsed directly from the STIX bundle. Filter, search, and copy individual indicators for quick action.

Download STIX
Showing 119 of 119
TypeValueDescriptionLabelsValid from
IPv4156.223.165.108High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=EG; asn=8452; asn_org=TE Datascanning_host2025-11-29
IPv464.62.197.13High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-29
IPv4103.40.61.98High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=IN; asn=133700; asn_org=Gleam Worldwide Services Pvt Ltd.malware_hosting2025-11-28
IPv4112.196.109.146High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=7; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11910 anomalous ICMPv4 type 3,code 4 Path MTU Discovery; cc=IN; asn=17917; asn_org=Quadrant Televentures Limitedmalware_hosting2025-11-28
IPv465.49.1.67High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-28
IPv4146.19.24.212High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Successful Administrator Privilege Gain; sigs(top)=GPL TFTP GET passwd; ports=69; cc=PL; asn=201814; asn_org=MEVSPACE sp. z o.o.scanning_host2025-11-28
IPv4156.196.212.123High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=EG; asn=8452; asn_org=TE Datascanning_host2025-11-28
IPv4156.212.76.164High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=EG; asn=8452; asn_org=TE Datascanning_host2025-11-28
IPv4175.107.37.91High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=60001; cc=PK; asn=23888; asn_org=National Telecommunication Corporation HQscanning_host2025-11-28
IPv474.82.47.43High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-27
IPv4195.7.6.43High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=DE; asn=51167; asn_org=Contabo GmbHmalware_hosting2025-11-26
IPv464.62.156.198High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-26
IPv441.36.60.247High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=EG; asn=8452; asn_org=TE Datascanning_host2025-11-26
IPv4197.48.220.236High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=EG; asn=8452; asn_org=TE Datascanning_host2025-11-25
IPv466.167.169.16High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=PK; asn=9541; asn_org=Cyber Internet Services Pvt Ltd.scanning_host2025-11-25
IPv465.49.1.207High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-25
IPv489.35.130.146High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=DE; asn=214309; asn_org=Aurorix Gaming Solutions Limitedmalware_hosting2025-11-25
IPv4185.138.88.86High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=NL; asn=215540; asn_org=Global Connectivity Solutions Llpmalware_hosting2025-11-24
IPv4114.111.54.188High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=KR; asn=54994; asn_org=ML-1432-54994malware_hosting2025-11-24
IPv4203.202.242.20High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=BD; asn=24323; asn_org=aamra networks limitedmalware_hosting2025-11-24
IPv464.62.197.58High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-24
IPv446.101.83.206High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=GB; asn=14061; asn_org=DIGITALOCEAN-ASNmalware_hosting2025-11-24
IPv413.90.230.183High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=US; asn=8075; asn_org=MICROSOFT-CORP-MSN-AS-BLOCKmalware_hosting2025-11-24
IPv4172.105.186.117High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Potentially Bad Traffic; sigs(top)=GPL ATTACK_RESPONSE id check returned root; ports=36366; cc=AU; asn=63949; asn_org=Akamai Connected Cloudscanning_host2025-11-24
IPv4120.61.207.243High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=5555; cc=IN; asn=9829; asn_org=National Internet Backbonescanning_host2025-11-23
IPv465.49.20.93High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv41.174.20.156High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=12; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible VXWORKS Urgent11 RCE Attempt - Illegal Urgent Flag; ET EXPLOIT Possible VXWORKS Urgent11 RCE Attempt - Urgent Flag; ports=239,3036,12482,33318,48324,52898; cc=TW; asn=3462; asn_org=Data Communication Business Groupmalware_hosting2025-11-23
IPv41.34.85.243High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=14; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible VXWORKS Urgent11 RCE Attempt - Illegal Urgent Flag; ET EXPLOIT Possible VXWORKS Urgent11 RCE Attempt - Urgent Flag; ports=10535,12323,13162,22277,46073,47405,61394; cc=TW; asn=3462; asn_org=Data Communication Business Groupmalware_hosting2025-11-23
IPv4101.36.104.242High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=JP; asn=135377; asn_org=UCLOUD INFORMATION TECHNOLOGY HK LIMITEDmalware_hosting2025-11-23
IPv4103.206.100.74High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=49152; cc=IN; asn=137120; asn_org=Nas Internet Services Private Limitedscanning_host2025-11-23
IPv4103.93.93.182High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=60001; cc=ID; asn=141140; asn_org=PT Jinde Grup Indonesiascanning_host2025-11-23
IPv4103.93.93.211High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=7574; cc=ID; asn=141140; asn_org=PT Jinde Grup Indonesiascanning_host2025-11-23
IPv4109.205.179.120High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FR; asn=51167; asn_org=Contabo GmbHmalware_hosting2025-11-23
IPv4110.37.26.193High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=60001; cc=PK; asn=38264; asn_org=National WiMAXIMS environmentscanning_host2025-11-23
IPv4111.70.25.39High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ports=80; cc=TW; asn=17421; asn_org=Mobile Business Groupscanning_host2025-11-23
IPv4115.248.8.65High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=IN; asn=18101; asn_org=Reliance Communications Ltd.DAKC MUMBAImalware_hosting2025-11-23
IPv4117.193.144.73High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=8080; cc=IN; asn=9829; asn_org=National Internet Backbonescanning_host2025-11-23
IPv4118.193.34.156High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=HK; asn=135377; asn_org=UCLOUD INFORMATION TECHNOLOGY HK LIMITEDmalware_hosting2025-11-23
IPv4124.198.131.83High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound; ports=8080; cc=US; asn=210558; asn_org=1337 Services GmbHmalware_hosting2025-11-23
IPv4128.199.184.71High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=SG; asn=14061; asn_org=DIGITALOCEAN-ASNmalware_hosting2025-11-23
IPv4138.197.41.105High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASNmalware_hosting2025-11-23
IPv4141.255.164.26High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=CH; asn=51852; asn_org=Private Layer INCmalware_hosting2025-11-23
IPv4147.93.183.81High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=US; asn=40021; asn_org=CONTABO-40021malware_hosting2025-11-23
IPv4154.16.10.170High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=HK; asn=61112; asn_org=AKILE LTDmalware_hosting2025-11-23
IPv4157.245.105.149High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=IN; asn=14061; asn_org=DIGITALOCEAN-ASNmalware_hosting2025-11-23
IPv4158.220.92.62High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=GB; asn=51167; asn_org=Contabo GmbHmalware_hosting2025-11-23
IPv4158.255.83.222High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=49152; cc=RU; asn=60904; asn_org=ATC Telecom LTD.scanning_host2025-11-23
IPv4165.154.233.77High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=4; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=PH; asn=142002; asn_org=Scloud Pte Ltdmalware_hosting2025-11-23
IPv4167.86.115.89High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FR; asn=51167; asn_org=Contabo GmbHmalware_hosting2025-11-23
IPv4168.107.23.247High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=KR; asn=31898; asn_org=ORACLE-BMC-31898malware_hosting2025-11-23
IPv4170.233.57.178High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=BR; asn=265087; asn_org=ANA PAULA SANTOS DE AMORIM - MEscanning_host2025-11-23
IPv4172.105.186.118High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11910 anomalous ICMPv4 type 3,code 4 Path MTU Discovery; cc=AU; asn=63949; asn_org=Akamai Connected Cloudmalware_hosting2025-11-23
IPv4173.212.239.137High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FR; asn=51167; asn_org=Contabo GmbHmalware_hosting2025-11-23
IPv4173.254.215.92High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=US; asn=36352; asn_org=AS-COLOCROSSINGmalware_hosting2025-11-23
IPv4175.200.104.40High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=KR; asn=4766; asn_org=Korea Telecommalware_hosting2025-11-23
IPv4179.150.109.254High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=BR; asn=26599; asn_org=TELEFONICA BRASIL S.Ascanning_host2025-11-23
IPv4182.60.6.39High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=49152; cc=IN; asn=9829; asn_org=National Internet Backbonescanning_host2025-11-23
IPv4184.105.139.108High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv4184.105.139.109High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv4185.218.127.171High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=305; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11910 anomalous ICMPv4 type 3,code 4 Path MTU Discovery; cc=AU; asn=212238; asn_org=Datacamp Limitedmalware_hosting2025-11-23
IPv4192.159.99.95High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=3; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound; ports=8080; cc=NL; asn=210558; asn_org=1337 Services GmbHmalware_hosting2025-11-23
IPv4192.210.160.141High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=NL; asn=36352; asn_org=AS-COLOCROSSINGmalware_hosting2025-11-23
IPv4195.179.230.17High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=DE; asn=51167; asn_org=Contabo GmbHmalware_hosting2025-11-23
IPv4195.250.31.41High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=IN; asn=199404; asn_org=WHG Hosting Services Ltdmalware_hosting2025-11-23
IPv42.57.121.61High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Denial of Service; sigs(top)=GPL VOIP SIP INVITE message flooding; ports=5060; cc=RO; asn=47890; asn_org=Unmanaged Ltdscanning_host2025-11-23
IPv4200.59.88.244High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=7574; cc=AR; asn=10617; asn_org=SION S.Ascanning_host2025-11-23
IPv4202.112.237.226High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=CN; asn=4538; asn_org=China Education and Research Network Centermalware_hosting2025-11-23
IPv4202.83.163.2High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=49152; cc=PK; asn=23888; asn_org=National Telecommunication Corporation HQscanning_host2025-11-23
IPv4203.91.121.41High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11910 anomalous ICMPv4 type 3,code 4 Path MTU Discovery; cc=CN; asn=4538; asn_org=China Education and Research Network Centermalware_hosting2025-11-23
IPv4204.44.119.241High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=US; asn=136258; asn_org=BrainStorm Network, Incmalware_hosting2025-11-23
IPv4207.180.208.95High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FR; asn=51167; asn_org=Contabo GmbHmalware_hosting2025-11-23
IPv4209.126.5.94High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=US; asn=40021; asn_org=CONTABO-40021malware_hosting2025-11-23
IPv4212.127.78.122High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=PL; asn=35179; asn_org=Korbank S. A.malware_hosting2025-11-23
IPv4212.227.76.145High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=DE; asn=8560; asn_org=IONOS SEmalware_hosting2025-11-23
IPv4213.176.16.122High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=NL; asn=215540; asn_org=Global Connectivity Solutions Llpmalware_hosting2025-11-23
IPv4213.176.17.21High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FI; asn=215540; asn_org=Global Connectivity Solutions Llpmalware_hosting2025-11-23
IPv4216.218.206.81High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv4217.154.8.107High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FR; asn=8560; asn_org=IONOS SEmalware_hosting2025-11-23
IPv4217.154.8.114High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FR; asn=8560; asn_org=IONOS SEmalware_hosting2025-11-23
IPv4217.154.8.174High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FR; asn=8560; asn_org=IONOS SEmalware_hosting2025-11-23
IPv423.158.56.159High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=DE; asn=63023; asn_org=AS-GLOBALTELEHOSTmalware_hosting2025-11-23
IPv423.95.35.114High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=US; asn=36352; asn_org=AS-COLOCROSSINGmalware_hosting2025-11-23
IPv427.0.216.153High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=8080; cc=IN; asn=24186; asn_org=RailTel Corporation of India Ltdscanning_host2025-11-23
IPv432.143.199.186High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=US; asn=7018; asn_org=ATT-INTERNET4malware_hosting2025-11-23
IPv436.255.18.122High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=49152; cc=IN; asn=24186; asn_org=RailTel Corporation of India Ltdscanning_host2025-11-23
IPv441.216.189.248High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=DE; asn=211138; asn_org=Private-Hosting di Cipriano oscarmalware_hosting2025-11-23
IPv443.224.249.34High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=TW; asn=55933; asn_org=Cloudie Limitedmalware_hosting2025-11-23
IPv443.251.17.236High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=HK; asn=55933; asn_org=Cloudie Limitedmalware_hosting2025-11-23
IPv445.114.127.228High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=CN; asn=206888; asn_org=HanMing HK Limitedmalware_hosting2025-11-23
IPv445.178.113.11High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=BR; asn=269037; asn_org=SEEG SERVICOS E TECNOLOGIAS LTDAmalware_hosting2025-11-23
IPv45.187.35.54High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Successful Administrator Privilege Gain; sigs(top)=GPL TFTP GET passwd; ports=69; cc=NL; asn=206264; asn_org=Amarutu Technology Ltdscanning_host2025-11-23
IPv461.245.11.87High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=PH; asn=19970; asn_org=CARRIERDOMAIN-NYCmalware_hosting2025-11-23
IPv461.3.102.238High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=5555; cc=IN; asn=9829; asn_org=National Internet Backbonescanning_host2025-11-23
IPv461.3.21.213High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=5555; cc=IN; asn=9829; asn_org=National Internet Backbonescanning_host2025-11-23
IPv464.62.156.124High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv464.62.156.128High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv464.62.156.163High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv464.62.156.168High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv464.62.156.177High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv464.62.197.76High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv464.62.197.94High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv465.49.1.112High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv465.49.1.161High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv465.49.1.179High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv465.49.1.210High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv465.49.1.36High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv465.49.1.95High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv465.49.20.120High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv472.255.26.60High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=7574; cc=PK; asn=9541; asn_org=Cyber Internet Services Pvt Ltd.scanning_host2025-11-23
IPv474.82.47.12High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv474.82.47.55High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANEmalware_hosting2025-11-23
IPv475.157.196.239High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=CA; asn=852; asn_org=TELUS Communicationsmalware_hosting2025-11-23
IPv481.90.31.117High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=IQ; asn=207713; asn_org=Global Internet Solutions LLCmalware_hosting2025-11-23
IPv484.46.246.251High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FR; asn=51167; asn_org=Contabo GmbHmalware_hosting2025-11-23
IPv487.229.255.206High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=317; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible VXWORKS Urgent11 RCE Attempt - Urgent Flag; ports=445; cc=RU; asn=3216; asn_org=PVimpelCommalware_hosting2025-11-23
IPv487.245.239.39High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=27; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11910 anomalous ICMPv4 type 3,code 4 Path MTU Discovery; cc=LV; asn=9002; asn_org=RETN Limitedmalware_hosting2025-11-23
IPv492.242.166.10High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=12; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11910 anomalous ICMPv4 type 3,code 4 Path MTU Discovery; cc=FI; asn=203446; asn_org=Smartnet Limitedmalware_hosting2025-11-23
IPv492.242.166.161High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=8; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11910 anomalous ICMPv4 type 3,code 4 Path MTU Discovery; cc=FI; asn=203446; asn_org=Smartnet Limitedmalware_hosting2025-11-23
IPv494.136.189.99High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=IN; asn=141995; asn_org=Contabo Asia Private Limitedmalware_hosting2025-11-23