SCARD

Suspicious activity by IP address 172.206.192.187

Below is a list of the last 500 suspicious interactions with this IP.

Last observed Mon, 30 Mar 2026 12:43:27 (Australia/Brisbane)

Back to main list

Summary of suspicious activity by IP address 172.206.192.187

Description Count
SURICATA HTTP Host header invalid 19
ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials 10
ET WEB_SERVER WebShell Generic - wget http - POST 7
ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 6
ET INFO F5 BIG-IP - Command Execution via util/bash 6
ET HUNTING Suspicious Chmod Usage in URI (Inbound) 2

Detailed activity by IP address 172.206.192.187

Timestamp Description Protocol Destination Port
2026-03-30 12:43:27 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-03-30 12:43:27 SURICATA HTTP Host header invalid TCP 80
2026-03-30 12:43:27 SURICATA HTTP Host header invalid TCP 80
2026-03-30 12:43:27 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-03-30 12:43:27 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-03-30 12:43:27 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-03-30 08:48:41 SURICATA HTTP Host header invalid TCP 80
2026-03-30 08:48:41 SURICATA HTTP Host header invalid TCP 80
2026-03-30 00:15:28 SURICATA HTTP Host header invalid TCP 80
2026-03-30 00:15:28 SURICATA HTTP Host header invalid TCP 80
2026-03-29 19:14:19 SURICATA HTTP Host header invalid TCP 80
2026-03-29 19:14:19 SURICATA HTTP Host header invalid TCP 80
2026-03-29 19:14:19 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-03-29 19:14:19 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-03-29 18:10:11 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-03-29 18:10:11 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-03-29 18:10:11 ET WEB_SERVER WebShell Generic - wget http - POST TCP 443
2026-03-29 18:10:11 SURICATA HTTP Host header invalid TCP 443
2026-03-29 18:10:11 ET WEB_SERVER WebShell Generic - wget http - POST TCP 443
2026-03-29 18:10:11 SURICATA HTTP Host header invalid TCP 443
2026-03-29 18:10:11 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-03-29 18:10:11 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-03-29 17:21:49 ET WEB_SERVER WebShell Generic - wget http - POST TCP 443
2026-03-29 17:21:49 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-03-29 17:21:49 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-03-29 17:21:49 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-03-29 17:21:49 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-03-29 17:21:49 SURICATA HTTP Host header invalid TCP 443
2026-03-29 17:21:49 SURICATA HTTP Host header invalid TCP 443
2026-03-29 17:21:49 ET WEB_SERVER WebShell Generic - wget http - POST TCP 443
2026-03-29 15:27:53 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-03-29 15:27:53 SURICATA HTTP Host header invalid TCP 443
2026-03-29 15:27:53 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-03-29 15:27:53 SURICATA HTTP Host header invalid TCP 443
2026-03-29 15:27:53 ET INFO F5 BIG-IP - Command Execution via util/bash TCP 443
2026-03-29 15:27:53 ET WEB_SERVER WebShell Generic - wget http - POST TCP 443
2026-03-29 15:27:53 ET WEB_SERVER WebShell Generic - wget http - POST TCP 443
2026-03-29 15:27:53 ET EXPLOIT F5 BIG-IP iControl REST Authentication Bypass Attempt (CVE-2022-1388) M3 TCP 443
2026-03-29 14:43:26 SURICATA HTTP Host header invalid TCP 80
2026-03-29 14:43:26 SURICATA HTTP Host header invalid TCP 80
2026-03-29 14:43:26 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-03-29 14:43:26 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-03-29 05:00:11 SURICATA HTTP Host header invalid TCP 80
2026-03-29 05:00:11 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-03-29 05:00:11 SURICATA HTTP Host header invalid TCP 80
2026-03-29 05:00:11 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-03-28 21:28:42 SURICATA HTTP Host header invalid TCP 80
2026-03-28 21:28:42 ET WEB_SERVER WebShell Generic - wget http - POST TCP 80
2026-03-28 07:03:58 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80
2026-03-28 02:38:36 ET WEB_SPECIFIC_APPS Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials TCP 80

 

Back to top