SCARD

Suspicious activity by IP address 130.61.73.99

Below is a list of the last 500 suspicious interactions with this IP.

Last observed Thu, 09 Apr 2026 02:24:57 (Australia/Brisbane)

Back to main list

Summary of suspicious activity by IP address 130.61.73.99

Description Count
SURICATA HTTP Host header invalid 64
ET WEB_SERVER WebShell Generic - wget http - POST 26
ET HUNTING Suspicious Chmod Usage in URI (Inbound) 15
ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials 14
ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 13
ET INFO F5 BIG-IP - Command Execution via util/bash 13

Detailed activity by IP address 130.61.73.99

Timestamp Description Protocol Destination Port
2026-04-09 02:24:57 SURICATA HTTP Host header invalid TCP 80
2026-04-09 02:24:57 ET WEB_SERVER WebShell Generic - wget http - POST TCP 80
2026-04-09 02:24:57 SURICATA HTTP Host header invalid TCP 80
2026-04-09 02:24:57 ET WEB_SERVER WebShell Generic - wget http - POST TCP 80
2026-04-08 19:23:44 ET WEB_SERVER WebShell Generic - wget http - POST TCP 80
2026-04-08 19:23:44 SURICATA HTTP Host header invalid TCP 80
2026-04-08 19:23:44 SURICATA HTTP Host header invalid TCP 80
2026-04-08 19:23:44 ET WEB_SERVER WebShell Generic - wget http - POST TCP 80
2026-04-07 12:59:45 SURICATA HTTP Host header invalid TCP 80
2026-04-07 12:59:45 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-04-07 12:59:45 SURICATA HTTP Host header invalid TCP 80
2026-04-07 12:59:45 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-04-07 12:59:45 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-04-07 12:59:45 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-04-07 09:06:38 SURICATA HTTP Host header invalid TCP 80
2026-04-07 09:06:38 SURICATA HTTP Host header invalid TCP 80
2026-04-07 09:06:37 SURICATA HTTP Host header invalid TCP 80
2026-04-07 09:06:37 SURICATA HTTP Host header invalid TCP 80
2026-04-07 01:34:21 SURICATA HTTP Host header invalid TCP 80
2026-04-07 01:34:21 SURICATA HTTP Host header invalid TCP 80
2026-04-06 21:15:29 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-04-06 21:15:29 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-04-06 19:31:30 SURICATA HTTP Host header invalid TCP 80
2026-04-06 19:31:30 SURICATA HTTP Host header invalid TCP 80
2026-04-06 19:04:31 SURICATA HTTP Host header invalid TCP 80
2026-04-06 19:04:31 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-04-06 19:04:31 SURICATA HTTP Host header invalid TCP 80
2026-04-06 19:04:31 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-04-06 19:04:31 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-04-06 19:04:31 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-04-06 17:19:26 SURICATA HTTP Host header invalid TCP 443
2026-04-06 17:19:26 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-04-06 17:19:26 SURICATA HTTP Host header invalid TCP 443
2026-04-06 17:19:26 ET WEB_SERVER WebShell Generic - wget http - POST TCP 443
2026-04-06 17:19:26 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-04-06 17:19:26 ET WEB_SERVER WebShell Generic - wget http - POST TCP 443
2026-04-06 17:19:26 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-04-06 17:19:26 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-04-06 16:43:08 SURICATA HTTP Host header invalid TCP 443
2026-04-06 16:43:08 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-04-06 16:43:08 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-04-06 16:43:08 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-04-06 16:43:08 ET WEB_SERVER WebShell Generic - wget http - POST TCP 443
2026-04-06 16:43:08 SURICATA HTTP Host header invalid TCP 443
2026-04-06 16:43:08 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-04-06 16:43:08 ET WEB_SERVER WebShell Generic - wget http - POST TCP 443
2026-04-06 16:09:22 SURICATA HTTP Host header invalid TCP 80
2026-04-06 16:09:22 SURICATA HTTP Host header invalid TCP 80
2026-04-06 16:09:22 ET WEB_SERVER WebShell Generic - wget http - POST TCP 80
2026-04-06 16:09:22 ET WEB_SERVER WebShell Generic - wget http - POST TCP 80
2026-04-05 01:58:48 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-04-05 01:58:48 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-04-05 01:58:48 SURICATA HTTP Host header invalid TCP 80
2026-04-05 01:58:48 SURICATA HTTP Host header invalid TCP 80
2026-04-05 01:58:48 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-04-05 01:58:48 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-04-04 15:51:21 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-04-04 15:51:21 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-04-04 15:51:21 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-04-04 15:51:21 ET WEB_SERVER WebShell Generic - wget http - POST TCP 443
2026-04-04 15:51:21 SURICATA HTTP Host header invalid TCP 443
2026-04-04 15:51:21 ET WEB_SERVER WebShell Generic - wget http - POST TCP 443
2026-04-04 15:51:21 SURICATA HTTP Host header invalid TCP 443
2026-04-04 15:51:21 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-04-03 23:07:08 SURICATA HTTP Host header invalid TCP 80
2026-04-03 23:07:08 SURICATA HTTP Host header invalid TCP 80
2026-04-03 23:07:08 SURICATA HTTP Host header invalid TCP 80
2026-04-03 23:07:08 SURICATA HTTP Host header invalid TCP 80
2026-04-03 14:51:02 ET WEB_SERVER WebShell Generic - wget http - POST TCP 80
2026-04-03 14:51:02 SURICATA HTTP Host header invalid TCP 80
2026-04-03 14:51:02 ET WEB_SERVER WebShell Generic - wget http - POST TCP 80
2026-04-03 14:51:02 SURICATA HTTP Host header invalid TCP 80
2026-04-02 09:59:22 SURICATA HTTP Host header invalid TCP 80
2026-04-02 09:59:22 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-04-02 09:59:22 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-04-02 09:59:22 SURICATA HTTP Host header invalid TCP 80
2026-04-02 04:08:39 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-04-02 04:08:39 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-04-02 03:29:55 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-04-02 03:29:55 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-04-02 03:29:55 SURICATA HTTP Host header invalid TCP 80
2026-04-02 03:29:55 SURICATA HTTP Host header invalid TCP 80
2026-04-02 01:41:01 SURICATA HTTP Host header invalid TCP 80
2026-04-02 01:41:01 SURICATA HTTP Host header invalid TCP 80
2026-04-02 01:41:01 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-04-02 01:41:01 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-04-01 19:33:10 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-04-01 19:33:10 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-04-01 15:33:51 SURICATA HTTP Host header invalid TCP 80
2026-04-01 15:33:51 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-04-01 15:33:51 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-04-01 15:33:51 SURICATA HTTP Host header invalid TCP 80
2026-04-01 08:01:32 SURICATA HTTP Host header invalid TCP 80
2026-04-01 08:01:32 SURICATA HTTP Host header invalid TCP 80
2026-03-31 10:44:10 ET WEB_SERVER WebShell Generic - wget http - POST TCP 80
2026-03-31 10:44:10 SURICATA HTTP Host header invalid TCP 80
2026-03-31 10:44:10 ET WEB_SERVER WebShell Generic - wget http - POST TCP 80
2026-03-31 10:44:10 SURICATA HTTP Host header invalid TCP 80
2026-03-31 08:16:36 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-03-31 08:16:36 SURICATA HTTP Host header invalid TCP 80
2026-03-31 08:16:36 SURICATA HTTP Host header invalid TCP 80
2026-03-31 08:16:36 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-03-29 13:00:21 ET WEB_SERVER WebShell Generic - wget http - POST TCP 80
2026-03-29 13:00:21 SURICATA HTTP Host header invalid TCP 80
2026-03-29 13:00:21 SURICATA HTTP Host header invalid TCP 80
2026-03-29 13:00:21 ET WEB_SERVER WebShell Generic - wget http - POST TCP 80
2026-03-29 12:49:31 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-03-28 22:03:25 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-03-28 22:03:25 SURICATA HTTP Host header invalid TCP 80
2026-03-28 22:03:25 SURICATA HTTP Host header invalid TCP 80
2026-03-28 22:03:25 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-03-28 10:54:19 ET WEB_SERVER WebShell Generic - wget http - POST TCP 443
2026-03-28 10:54:19 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-03-28 10:54:19 SURICATA HTTP Host header invalid TCP 443
2026-03-28 10:54:19 ET WEB_SERVER WebShell Generic - wget http - POST TCP 443
2026-03-28 10:54:19 SURICATA HTTP Host header invalid TCP 443
2026-03-28 10:54:19 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-03-28 10:54:19 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-03-28 10:54:19 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-03-28 03:36:30 SURICATA HTTP Host header invalid TCP 80
2026-03-28 03:36:30 SURICATA HTTP Host header invalid TCP 80
2026-03-28 03:36:30 ET WEB_SERVER WebShell Generic - wget http - POST TCP 80
2026-03-28 03:36:30 ET WEB_SERVER WebShell Generic - wget http - POST TCP 80
2026-03-27 15:37:46 SURICATA HTTP Host header invalid TCP 80
2026-03-27 15:37:46 SURICATA HTTP Host header invalid TCP 80
2026-03-27 06:54:10 SURICATA HTTP Host header invalid TCP 80
2026-03-27 06:54:10 SURICATA HTTP Host header invalid TCP 80
2026-03-27 06:54:10 ET WEB_SERVER WebShell Generic - wget http - POST TCP 80
2026-03-27 06:54:10 ET WEB_SERVER WebShell Generic - wget http - POST TCP 80
2026-03-27 04:23:20 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-03-27 04:23:20 SURICATA HTTP Host header invalid TCP 80
2026-03-27 04:23:20 SURICATA HTTP Host header invalid TCP 80
2026-03-27 04:23:20 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-03-27 01:47:58 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-03-27 01:47:58 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-03-26 20:57:34 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-03-26 20:57:34 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-03-26 20:57:34 ET WEB_SERVER WebShell Generic - wget http - POST TCP 443
2026-03-26 20:57:34 SURICATA HTTP Host header invalid TCP 443
2026-03-26 20:57:34 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-03-26 20:57:34 ET WEB_SERVER WebShell Generic - wget http - POST TCP 443
2026-03-26 20:57:34 SURICATA HTTP Host header invalid TCP 443
2026-03-26 20:57:34 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-03-26 05:26:15 SURICATA HTTP Host header invalid TCP 80
2026-03-26 05:26:15 SURICATA HTTP Host header invalid TCP 80

 

Back to top