Honeypot overview
Suricata Network IDS.
Network Intrusion Detection System (IDS) monitoring traffic for malicious signatures. Indicators flow straight from the OTX STIX export, while Robert AI writes the monthly breakdown so you can brief stakeholders with specifics that matter.
NadSec Honeypot
Everything here is malicious on purpose. No production data.
Data source
T-Pot CE
Raw logs to STIX to OTX pulse.
Report author
Robert AI
Summaries and snark only.
Snapshot
November 2025 Pulse
Quick stats parsed from the current month STIX export.
Unique IP indicators
0
Distinct source IPs in the STIX bundle.
Hash indicators
0
File hashes associated with IDS activity.
Indicator objects
0
Total STIX indicator objects.
Signal strength
0
Plenty of brute-force automation; little human hands.
Scope
IDS Alerts
Signals come strictly from the Suricata IDS STIX bundle.
What to do
Block & Investigate
Use IPs and hashes for blocking or enrichment. Check payloads for context.
Caveats
False Positives Possible
Tune to your risk appetite before auto-blocking anything in prod. Need help implementing? NadTech Support can assist.
Monthly report
Robert's November 2025 brief
Suricata → High & Medium Alert IPs – Australia – November 2025
Executive Summary
Ah, November. While most were busy stocking up on holiday cheer, some shady characters were on a different mission. During this jolly period, the Suricata IDS (T-Pot Sydney) decided to play Grinch and caught hordes of dubious IPs, up to no good across Australia. From attempts to play superuser to dubious downloads that your mother warned you about, the month's activity was an eyebrow-raiser. All signs point to Mirai-style botnets throwing a party we weren't invited to, hosted thanks to some accommodating ISPs around the globe.
Key Stats
- Timeframe: November 2025
- Sensor: Suricata IDS (T-Pot Sydney)
- Volume: Hundreds of attempts targeting IoT devices, with a heavy hand on admin privilege exploitation.
- Noteworthy ASNs & Infra:
- Data Communication Business Group (ASN: 3462)
- DigitalOcean (ASN: 14061)
- Hurricane Electric (ASN: 6939)
- Contabo GmbH (ASN: 51167)
- RailTel Corporation of India Ltd (ASN: 24186)
Campaign Narrative
The plot's as thick as grandma's stew—various actors squatted on a mix of half-respectable cloud hosts and questionable backstreets of the internet. While most folks were worrying about stuffing turkeys, this crowd was more into stuffing admin creds and POST requests into unsuspecting devices. The activity smells distinctly of opportunism, the kind you wouldn't clap for in a sitcom.
Infrastructure Details
Oh, hosting providers, the Robin Hoods of our story—if Robin Hood decided to rob the rich and give to... malware-spewing botnets. This month, DigitalOcean and Hurricane Electric were headliners, hosting malware that makes your average crimeware look downright pedestrian. Contabo and RailTel weren't far behind, supporting a delightful array of scanning hosts channelling their inner Mirai.
Bulletproof hosts were rolling out the digital red carpet, laced with late-night IOT downloader traffic. Meanwhile, Datacamp Limited made a cameo appearance, potentially catering to the more "research-oriented" neighbours, bless their proactive hearts.
Malware and Behaviour
Meet the cast: a medley of vulnerabilities and dubious JavaScript antics, from VXWORKS Urgent11 championship exploits to the ever-so-stylish CVE-2020-11900. It's all about forcing admin privileges through the window while legitimate configs take the front door. These actors love nothing more than IoT malware slathered in POST request sauce—a favourite recipe of the so-helpfully-detailed crimeware cookbook.
Detection and Mitigation
Firewall Efficacy: Consider putting the screws on those pesky ports like 8080 and 49152. If it sounds unfamiliar and feels a tad Mirai-esque, lock it up.
Intelligent Log Focus: Time to stop relying on wishful thinking. Glance over the logs for anomalies, particularly attempted privilege escalations and unexpected device chatter.
Prioritise Patch Management: Patch. Everything. Yesterday. Those CVEs won't fix themselves, and nothing ruins a hacker's day more than fully updated firmware.
Quarantine Measures: Isolate infected IoT devices faster than you’d dive for the last slice of cake at a party. Trust me, your network will thank you.
Closing Thoughts
As we head into December, let's hope the gift of knowledge and mitigation keeps the malware bah-humbug down. Yes, it's another campaign from the depths of the internet's less charming neighbourhoods, but chin up. With the right mix of monitoring, patching, and slightly paranoid vigilance, you can tell these malefactors to “do one” until the new year and beyond.
Stay watchful, be grumpy, and may your networks remain unbreached!
STIX indicators
OTX pulse export
Parsed directly from the STIX bundle. Filter, search, and copy individual indicators for quick action.
| Type | Value | Description | Labels | Valid from | |
|---|---|---|---|---|---|
| IPv4 | 156.223.165.108 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=EG; asn=8452; asn_org=TE Data | scanning_host | 2025-11-29 | |
| IPv4 | 64.62.197.13 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-29 | |
| IPv4 | 103.40.61.98 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=IN; asn=133700; asn_org=Gleam Worldwide Services Pvt Ltd. | malware_hosting | 2025-11-28 | |
| IPv4 | 112.196.109.146 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=7; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11910 anomalous ICMPv4 type 3,code 4 Path MTU Discovery; cc=IN; asn=17917; asn_org=Quadrant Televentures Limited | malware_hosting | 2025-11-28 | |
| IPv4 | 65.49.1.67 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-28 | |
| IPv4 | 146.19.24.212 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Successful Administrator Privilege Gain; sigs(top)=GPL TFTP GET passwd; ports=69; cc=PL; asn=201814; asn_org=MEVSPACE sp. z o.o. | scanning_host | 2025-11-28 | |
| IPv4 | 156.196.212.123 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=EG; asn=8452; asn_org=TE Data | scanning_host | 2025-11-28 | |
| IPv4 | 156.212.76.164 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=EG; asn=8452; asn_org=TE Data | scanning_host | 2025-11-28 | |
| IPv4 | 175.107.37.91 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=60001; cc=PK; asn=23888; asn_org=National Telecommunication Corporation HQ | scanning_host | 2025-11-28 | |
| IPv4 | 74.82.47.43 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-27 | |
| IPv4 | 195.7.6.43 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=DE; asn=51167; asn_org=Contabo GmbH | malware_hosting | 2025-11-26 | |
| IPv4 | 64.62.156.198 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-26 | |
| IPv4 | 41.36.60.247 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=EG; asn=8452; asn_org=TE Data | scanning_host | 2025-11-26 | |
| IPv4 | 197.48.220.236 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=EG; asn=8452; asn_org=TE Data | scanning_host | 2025-11-25 | |
| IPv4 | 66.167.169.16 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=PK; asn=9541; asn_org=Cyber Internet Services Pvt Ltd. | scanning_host | 2025-11-25 | |
| IPv4 | 65.49.1.207 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-25 | |
| IPv4 | 89.35.130.146 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=DE; asn=214309; asn_org=Aurorix Gaming Solutions Limited | malware_hosting | 2025-11-25 | |
| IPv4 | 185.138.88.86 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=NL; asn=215540; asn_org=Global Connectivity Solutions Llp | malware_hosting | 2025-11-24 | |
| IPv4 | 114.111.54.188 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=KR; asn=54994; asn_org=ML-1432-54994 | malware_hosting | 2025-11-24 | |
| IPv4 | 203.202.242.20 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=BD; asn=24323; asn_org=aamra networks limited | malware_hosting | 2025-11-24 | |
| IPv4 | 64.62.197.58 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-24 | |
| IPv4 | 46.101.83.206 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=GB; asn=14061; asn_org=DIGITALOCEAN-ASN | malware_hosting | 2025-11-24 | |
| IPv4 | 13.90.230.183 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=US; asn=8075; asn_org=MICROSOFT-CORP-MSN-AS-BLOCK | malware_hosting | 2025-11-24 | |
| IPv4 | 172.105.186.117 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Potentially Bad Traffic; sigs(top)=GPL ATTACK_RESPONSE id check returned root; ports=36366; cc=AU; asn=63949; asn_org=Akamai Connected Cloud | scanning_host | 2025-11-24 | |
| IPv4 | 120.61.207.243 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=5555; cc=IN; asn=9829; asn_org=National Internet Backbone | scanning_host | 2025-11-23 | |
| IPv4 | 65.49.20.93 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 1.174.20.156 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=12; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible VXWORKS Urgent11 RCE Attempt - Illegal Urgent Flag; ET EXPLOIT Possible VXWORKS Urgent11 RCE Attempt - Urgent Flag; ports=239,3036,12482,33318,48324,52898; cc=TW; asn=3462; asn_org=Data Communication Business Group | malware_hosting | 2025-11-23 | |
| IPv4 | 1.34.85.243 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=14; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible VXWORKS Urgent11 RCE Attempt - Illegal Urgent Flag; ET EXPLOIT Possible VXWORKS Urgent11 RCE Attempt - Urgent Flag; ports=10535,12323,13162,22277,46073,47405,61394; cc=TW; asn=3462; asn_org=Data Communication Business Group | malware_hosting | 2025-11-23 | |
| IPv4 | 101.36.104.242 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=JP; asn=135377; asn_org=UCLOUD INFORMATION TECHNOLOGY HK LIMITED | malware_hosting | 2025-11-23 | |
| IPv4 | 103.206.100.74 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=49152; cc=IN; asn=137120; asn_org=Nas Internet Services Private Limited | scanning_host | 2025-11-23 | |
| IPv4 | 103.93.93.182 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=60001; cc=ID; asn=141140; asn_org=PT Jinde Grup Indonesia | scanning_host | 2025-11-23 | |
| IPv4 | 103.93.93.211 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=7574; cc=ID; asn=141140; asn_org=PT Jinde Grup Indonesia | scanning_host | 2025-11-23 | |
| IPv4 | 109.205.179.120 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FR; asn=51167; asn_org=Contabo GmbH | malware_hosting | 2025-11-23 | |
| IPv4 | 110.37.26.193 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain,Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ET SCAN Mirai Variant User-Agent (Inbound); ports=60001; cc=PK; asn=38264; asn_org=National WiMAXIMS environment | scanning_host | 2025-11-23 | |
| IPv4 | 111.70.25.39 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Web Application Attack; sigs(top)=ET SCAN JAWS Webserver Unauthenticated Shell Command Execution; ports=80; cc=TW; asn=17421; asn_org=Mobile Business Group | scanning_host | 2025-11-23 | |
| IPv4 | 115.248.8.65 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=IN; asn=18101; asn_org=Reliance Communications Ltd.DAKC MUMBAI | malware_hosting | 2025-11-23 | |
| IPv4 | 117.193.144.73 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=8080; cc=IN; asn=9829; asn_org=National Internet Backbone | scanning_host | 2025-11-23 | |
| IPv4 | 118.193.34.156 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=HK; asn=135377; asn_org=UCLOUD INFORMATION TECHNOLOGY HK LIMITED | malware_hosting | 2025-11-23 | |
| IPv4 | 124.198.131.83 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound; ports=8080; cc=US; asn=210558; asn_org=1337 Services GmbH | malware_hosting | 2025-11-23 | |
| IPv4 | 128.199.184.71 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=SG; asn=14061; asn_org=DIGITALOCEAN-ASN | malware_hosting | 2025-11-23 | |
| IPv4 | 138.197.41.105 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=US; asn=14061; asn_org=DIGITALOCEAN-ASN | malware_hosting | 2025-11-23 | |
| IPv4 | 141.255.164.26 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=CH; asn=51852; asn_org=Private Layer INC | malware_hosting | 2025-11-23 | |
| IPv4 | 147.93.183.81 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=US; asn=40021; asn_org=CONTABO-40021 | malware_hosting | 2025-11-23 | |
| IPv4 | 154.16.10.170 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=HK; asn=61112; asn_org=AKILE LTD | malware_hosting | 2025-11-23 | |
| IPv4 | 157.245.105.149 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=IN; asn=14061; asn_org=DIGITALOCEAN-ASN | malware_hosting | 2025-11-23 | |
| IPv4 | 158.220.92.62 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=GB; asn=51167; asn_org=Contabo GmbH | malware_hosting | 2025-11-23 | |
| IPv4 | 158.255.83.222 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=49152; cc=RU; asn=60904; asn_org=ATC Telecom LTD. | scanning_host | 2025-11-23 | |
| IPv4 | 165.154.233.77 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=4; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=PH; asn=142002; asn_org=Scloud Pte Ltd | malware_hosting | 2025-11-23 | |
| IPv4 | 167.86.115.89 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FR; asn=51167; asn_org=Contabo GmbH | malware_hosting | 2025-11-23 | |
| IPv4 | 168.107.23.247 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=KR; asn=31898; asn_org=ORACLE-BMC-31898 | malware_hosting | 2025-11-23 | |
| IPv4 | 170.233.57.178 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=BR; asn=265087; asn_org=ANA PAULA SANTOS DE AMORIM - ME | scanning_host | 2025-11-23 | |
| IPv4 | 172.105.186.118 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11910 anomalous ICMPv4 type 3,code 4 Path MTU Discovery; cc=AU; asn=63949; asn_org=Akamai Connected Cloud | malware_hosting | 2025-11-23 | |
| IPv4 | 173.212.239.137 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FR; asn=51167; asn_org=Contabo GmbH | malware_hosting | 2025-11-23 | |
| IPv4 | 173.254.215.92 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=US; asn=36352; asn_org=AS-COLOCROSSING | malware_hosting | 2025-11-23 | |
| IPv4 | 175.200.104.40 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=KR; asn=4766; asn_org=Korea Telecom | malware_hosting | 2025-11-23 | |
| IPv4 | 179.150.109.254 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=80; cc=BR; asn=26599; asn_org=TELEFONICA BRASIL S.A | scanning_host | 2025-11-23 | |
| IPv4 | 182.60.6.39 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=49152; cc=IN; asn=9829; asn_org=National Internet Backbone | scanning_host | 2025-11-23 | |
| IPv4 | 184.105.139.108 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 184.105.139.109 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 185.218.127.171 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=305; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11910 anomalous ICMPv4 type 3,code 4 Path MTU Discovery; cc=AU; asn=212238; asn_org=Datacamp Limited | malware_hosting | 2025-11-23 | |
| IPv4 | 192.159.99.95 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=3; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound; ports=8080; cc=NL; asn=210558; asn_org=1337 Services GmbH | malware_hosting | 2025-11-23 | |
| IPv4 | 192.210.160.141 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=NL; asn=36352; asn_org=AS-COLOCROSSING | malware_hosting | 2025-11-23 | |
| IPv4 | 195.179.230.17 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=DE; asn=51167; asn_org=Contabo GmbH | malware_hosting | 2025-11-23 | |
| IPv4 | 195.250.31.41 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=IN; asn=199404; asn_org=WHG Hosting Services Ltd | malware_hosting | 2025-11-23 | |
| IPv4 | 2.57.121.61 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Denial of Service; sigs(top)=GPL VOIP SIP INVITE message flooding; ports=5060; cc=RO; asn=47890; asn_org=Unmanaged Ltd | scanning_host | 2025-11-23 | |
| IPv4 | 200.59.88.244 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=7574; cc=AR; asn=10617; asn_org=SION S.A | scanning_host | 2025-11-23 | |
| IPv4 | 202.112.237.226 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=CN; asn=4538; asn_org=China Education and Research Network Center | malware_hosting | 2025-11-23 | |
| IPv4 | 202.83.163.2 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=49152; cc=PK; asn=23888; asn_org=National Telecommunication Corporation HQ | scanning_host | 2025-11-23 | |
| IPv4 | 203.91.121.41 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11910 anomalous ICMPv4 type 3,code 4 Path MTU Discovery; cc=CN; asn=4538; asn_org=China Education and Research Network Center | malware_hosting | 2025-11-23 | |
| IPv4 | 204.44.119.241 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=US; asn=136258; asn_org=BrainStorm Network, Inc | malware_hosting | 2025-11-23 | |
| IPv4 | 207.180.208.95 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FR; asn=51167; asn_org=Contabo GmbH | malware_hosting | 2025-11-23 | |
| IPv4 | 209.126.5.94 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=US; asn=40021; asn_org=CONTABO-40021 | malware_hosting | 2025-11-23 | |
| IPv4 | 212.127.78.122 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=PL; asn=35179; asn_org=Korbank S. A. | malware_hosting | 2025-11-23 | |
| IPv4 | 212.227.76.145 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=DE; asn=8560; asn_org=IONOS SE | malware_hosting | 2025-11-23 | |
| IPv4 | 213.176.16.122 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=NL; asn=215540; asn_org=Global Connectivity Solutions Llp | malware_hosting | 2025-11-23 | |
| IPv4 | 213.176.17.21 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FI; asn=215540; asn_org=Global Connectivity Solutions Llp | malware_hosting | 2025-11-23 | |
| IPv4 | 216.218.206.81 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 217.154.8.107 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FR; asn=8560; asn_org=IONOS SE | malware_hosting | 2025-11-23 | |
| IPv4 | 217.154.8.114 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FR; asn=8560; asn_org=IONOS SE | malware_hosting | 2025-11-23 | |
| IPv4 | 217.154.8.174 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FR; asn=8560; asn_org=IONOS SE | malware_hosting | 2025-11-23 | |
| IPv4 | 23.158.56.159 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=DE; asn=63023; asn_org=AS-GLOBALTELEHOST | malware_hosting | 2025-11-23 | |
| IPv4 | 23.95.35.114 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=US; asn=36352; asn_org=AS-COLOCROSSING | malware_hosting | 2025-11-23 | |
| IPv4 | 27.0.216.153 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=8080; cc=IN; asn=24186; asn_org=RailTel Corporation of India Ltd | scanning_host | 2025-11-23 | |
| IPv4 | 32.143.199.186 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=US; asn=7018; asn_org=ATT-INTERNET4 | malware_hosting | 2025-11-23 | |
| IPv4 | 36.255.18.122 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=49152; cc=IN; asn=24186; asn_org=RailTel Corporation of India Ltd | scanning_host | 2025-11-23 | |
| IPv4 | 41.216.189.248 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=DE; asn=211138; asn_org=Private-Hosting di Cipriano oscar | malware_hosting | 2025-11-23 | |
| IPv4 | 43.224.249.34 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=TW; asn=55933; asn_org=Cloudie Limited | malware_hosting | 2025-11-23 | |
| IPv4 | 43.251.17.236 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=HK; asn=55933; asn_org=Cloudie Limited | malware_hosting | 2025-11-23 | |
| IPv4 | 45.114.127.228 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=CN; asn=206888; asn_org=HanMing HK Limited | malware_hosting | 2025-11-23 | |
| IPv4 | 45.178.113.11 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=BR; asn=269037; asn_org=SEEG SERVICOS E TECNOLOGIAS LTDA | malware_hosting | 2025-11-23 | |
| IPv4 | 5.187.35.54 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Successful Administrator Privilege Gain; sigs(top)=GPL TFTP GET passwd; ports=69; cc=NL; asn=206264; asn_org=Amarutu Technology Ltd | scanning_host | 2025-11-23 | |
| IPv4 | 61.245.11.87 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=PH; asn=19970; asn_org=CARRIERDOMAIN-NYC | malware_hosting | 2025-11-23 | |
| IPv4 | 61.3.102.238 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=5555; cc=IN; asn=9829; asn_org=National Internet Backbone | scanning_host | 2025-11-23 | |
| IPv4 | 61.3.21.213 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=5555; cc=IN; asn=9829; asn_org=National Internet Backbone | scanning_host | 2025-11-23 | |
| IPv4 | 64.62.156.124 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 64.62.156.128 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 64.62.156.163 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 64.62.156.168 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 64.62.156.177 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 64.62.197.76 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 64.62.197.94 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 65.49.1.112 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 65.49.1.161 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 65.49.1.179 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 65.49.1.210 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 65.49.1.36 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 65.49.1.95 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 65.49.20.120 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 72.255.26.60 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET SCAN Mirai Variant User-Agent (Inbound); ports=7574; cc=PK; asn=9541; asn_org=Cyber Internet Services Pvt Ltd. | scanning_host | 2025-11-23 | |
| IPv4 | 74.82.47.12 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 74.82.47.55 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=1; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free; cc=US; asn=6939; asn_org=HURRICANE | malware_hosting | 2025-11-23 | |
| IPv4 | 75.157.196.239 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=CA; asn=852; asn_org=TELUS Communications | malware_hosting | 2025-11-23 | |
| IPv4 | 81.90.31.117 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=IQ; asn=207713; asn_org=Global Internet Solutions LLC | malware_hosting | 2025-11-23 | |
| IPv4 | 84.46.246.251 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=FR; asn=51167; asn_org=Contabo GmbH | malware_hosting | 2025-11-23 | |
| IPv4 | 87.229.255.206 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=317; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible VXWORKS Urgent11 RCE Attempt - Urgent Flag; ports=445; cc=RU; asn=3216; asn_org=PVimpelCom | malware_hosting | 2025-11-23 | |
| IPv4 | 87.245.239.39 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=27; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11910 anomalous ICMPv4 type 3,code 4 Path MTU Discovery; cc=LV; asn=9002; asn_org=RETN Limited | malware_hosting | 2025-11-23 | |
| IPv4 | 92.242.166.10 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=12; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11910 anomalous ICMPv4 type 3,code 4 Path MTU Discovery; cc=FI; asn=203446; asn_org=Smartnet Limited | malware_hosting | 2025-11-23 | |
| IPv4 | 92.242.166.161 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=8; categories=Attempted Administrator Privilege Gain; sigs(top)=ET EXPLOIT Possible CVE-2020-11910 anomalous ICMPv4 type 3,code 4 Path MTU Discovery; cc=FI; asn=203446; asn_org=Smartnet Limited | malware_hosting | 2025-11-23 | |
| IPv4 | 94.136.189.99 | High & Medium Suricata IDS Source / seen in Suricata IDS alerts; events=2; categories=Potentially Bad Traffic; sigs(top)=ET HUNTING Generic IOT Downloader Malware in POST (Inbound); ports=80; cc=IN; asn=141995; asn_org=Contabo Asia Private Limited | malware_hosting | 2025-11-23 |