SCARD

Suspicious activity by IP address 14.1.106.206

Below is a list of the last 500 suspicious interactions with this IP.

Last observed Sun, 29 Mar 2026 01:07:15 (Australia/Brisbane)

Back to main list

Summary of suspicious activity by IP address 14.1.106.206

Description Count
ET SCAN Mirai Variant User-Agent (Inbound) 2
ET EXPLOIT MVPower DVR Shell UCE 2
ET WEB_SPECIFIC_APPS MVPower CCTV DVR /shell JAWS Webserver Unauthenticated Remote Command Execution (CVE-2016-20016) 2
ET HUNTING Suspicious Chmod Usage in URI (Inbound) 2
ET SCAN JAWS Webserver Unauthenticated Shell Command Execution 2

Detailed activity by IP address 14.1.106.206

Timestamp Description Protocol Destination Port
2026-03-29 01:07:15 ET SCAN Mirai Variant User-Agent (Inbound) TCP 80
2026-03-29 01:07:15 ET SCAN Mirai Variant User-Agent (Inbound) TCP 80
2026-03-29 01:07:15 ET EXPLOIT MVPower DVR Shell UCE TCP 80
2026-03-29 01:07:15 ET WEB_SPECIFIC_APPS MVPower CCTV DVR /shell JAWS Webserver Unauthenticated Remote Command Execution (CVE-2016-20016) TCP 80
2026-03-29 01:07:15 ET EXPLOIT MVPower DVR Shell UCE TCP 80
2026-03-29 01:07:15 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-03-29 01:07:15 ET SCAN JAWS Webserver Unauthenticated Shell Command Execution TCP 80
2026-03-29 01:07:15 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-03-29 01:07:15 ET WEB_SPECIFIC_APPS MVPower CCTV DVR /shell JAWS Webserver Unauthenticated Remote Command Execution (CVE-2016-20016) TCP 80
2026-03-29 01:07:15 ET SCAN JAWS Webserver Unauthenticated Shell Command Execution TCP 80

 

Back to top