SCARD

Suspicious activity by IP address 103.93.93.170

Below is a list of the last 500 suspicious interactions with this IP.

Last observed Mon, 13 Apr 2026 23:37:59 (Australia/Brisbane)

Back to main list

Summary of suspicious activity by IP address 103.93.93.170

Description Count
ET INFO Netlink GPON Login Attempt (GET) 6
ET EXPLOIT Netgear DGN Remote Command Execution 2
SERVER-WEBAPP Netgear DGN1000 series routers authentication bypass attempt 2
ET EXPLOIT HackingTrio UA (Hello, World) 1
ET EXPLOIT D-Link Devices Home Network Administration Protocol Command Execution 1
ET WEB_SERVER WGET Command Specifying Output in HTTP Headers 1

Detailed activity by IP address 103.93.93.170

Timestamp Description Protocol Destination Port
2026-04-13 23:37:59 ET INFO Netlink GPON Login Attempt (GET) TCP 80
2026-04-13 23:37:58 ET INFO Netlink GPON Login Attempt (GET) TCP 80
2026-04-13 06:36:09 ET INFO Netlink GPON Login Attempt (GET) TCP 8080
2026-04-12 10:28:01 ET INFO Netlink GPON Login Attempt (GET) TCP 80
2026-04-12 10:28:01 ET INFO Netlink GPON Login Attempt (GET) TCP 80
2026-04-11 08:53:30 ET EXPLOIT Netgear DGN Remote Command Execution TCP 80
2026-04-11 08:53:30 ET EXPLOIT Netgear DGN Remote Command Execution TCP 80
2026-04-11 08:53:30 SERVER-WEBAPP Netgear DGN1000 series routers authentication bypass attempt TCP 80
2026-04-11 08:53:30 SERVER-WEBAPP Netgear DGN1000 series routers authentication bypass attempt TCP 80
2026-04-07 18:18:54 ET INFO Netlink GPON Login Attempt (GET) TCP 80
2026-04-06 02:32:25 ET EXPLOIT HackingTrio UA (Hello, World) TCP 80
2026-04-05 07:49:52 ET EXPLOIT D-Link Devices Home Network Administration Protocol Command Execution TCP 80
2026-04-05 07:49:52 ET WEB_SERVER WGET Command Specifying Output in HTTP Headers TCP 80

 

Back to top