SCARD

Suspicious activity by IP address 194.233.65.152

Below is a list of the last 500 suspicious interactions with this IP.

Last observed Fri, 10 Apr 2026 10:45:05 (Australia/Brisbane)

Back to main list

Summary of suspicious activity by IP address 194.233.65.152

Description Count
ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 19
ET WEB_SERVER PHP.//Input in HTTP POST 4
ET WEB_SERVER Generic PHP Remote File Include 4
ET WEB_SERVER allow_url_include PHP config option in uri 4
ET HUNTING Suspicious PHP Code in HTTP POST (Inbound) 4
ET WEB_SERVER PHP tags in HTTP POST 4
ET WEB_SERVER auto_prepend_file PHP config option in uri 4
ET WEB_SPECIFIC_APPS PHP-CGI OS Command Injection (soft hyphen) (CVE-2024-4577) 4
ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body 4
SERVER-WEBAPP PHP PHP-CGI command execution attempt 2

Detailed activity by IP address 194.233.65.152

Timestamp Description Protocol Destination Port
2026-04-10 10:45:05 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-10 10:45:04 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-10 07:00:53 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-10 07:00:52 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-10 04:17:08 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-09 23:28:24 ET WEB_SERVER auto_prepend_file PHP config option in uri TCP 80
2026-04-09 23:28:24 ET WEB_SPECIFIC_APPS PHP-CGI OS Command Injection (soft hyphen) (CVE-2024-4577) TCP 80
2026-04-09 23:28:24 ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body TCP 80
2026-04-09 23:28:24 ET WEB_SERVER PHP tags in HTTP POST TCP 80
2026-04-09 23:28:24 ET WEB_SERVER allow_url_include PHP config option in uri TCP 80
2026-04-09 23:28:24 ET WEB_SPECIFIC_APPS PHP-CGI OS Command Injection (soft hyphen) (CVE-2024-4577) TCP 80
2026-04-09 23:28:24 ET WEB_SERVER PHP tags in HTTP POST TCP 80
2026-04-09 23:28:24 ET HUNTING Suspicious PHP Code in HTTP POST (Inbound) TCP 80
2026-04-09 23:28:24 ET WEB_SERVER PHP.//Input in HTTP POST TCP 80
2026-04-09 23:28:24 ET WEB_SERVER Generic PHP Remote File Include TCP 80
2026-04-09 23:28:24 ET WEB_SERVER auto_prepend_file PHP config option in uri TCP 80
2026-04-09 23:28:24 ET WEB_SERVER PHP.//Input in HTTP POST TCP 80
2026-04-09 23:28:24 ET WEB_SERVER Generic PHP Remote File Include TCP 80
2026-04-09 23:28:24 SERVER-WEBAPP PHP PHP-CGI command execution attempt TCP 80
2026-04-09 23:28:24 SERVER-WEBAPP PHP PHP-CGI command execution attempt TCP 80
2026-04-09 23:28:24 ET WEB_SERVER allow_url_include PHP config option in uri TCP 80
2026-04-09 23:28:24 ET HUNTING Suspicious PHP Code in HTTP POST (Inbound) TCP 80
2026-04-09 23:28:24 ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body TCP 80
2026-04-09 23:27:24 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-09 23:27:24 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-09 17:15:47 ET WEB_SERVER PHP.//Input in HTTP POST TCP 80
2026-04-09 17:15:47 ET WEB_SERVER Generic PHP Remote File Include TCP 80
2026-04-09 17:15:47 ET WEB_SERVER allow_url_include PHP config option in uri TCP 80
2026-04-09 17:15:47 ET WEB_SPECIFIC_APPS PHP-CGI OS Command Injection (soft hyphen) (CVE-2024-4577) TCP 80
2026-04-09 17:15:47 ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body TCP 80
2026-04-09 17:15:47 ET WEB_SERVER auto_prepend_file PHP config option in uri TCP 80
2026-04-09 17:15:47 ET WEB_SERVER PHP tags in HTTP POST TCP 80
2026-04-09 17:15:47 ET HUNTING Suspicious PHP Code in HTTP POST (Inbound) TCP 80
2026-04-09 16:14:15 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-09 12:23:46 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-09 12:23:46 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-09 10:50:48 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-09 10:50:48 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-09 09:24:53 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-09 09:24:53 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-09 08:20:47 ET WEB_SERVER Generic PHP Remote File Include TCP 80
2026-04-09 08:20:47 ET WEB_SERVER auto_prepend_file PHP config option in uri TCP 80
2026-04-09 08:20:47 ET WEB_SERVER PHP tags in HTTP POST TCP 80
2026-04-09 08:20:47 ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body TCP 80
2026-04-09 08:20:47 ET HUNTING Suspicious PHP Code in HTTP POST (Inbound) TCP 80
2026-04-09 08:20:47 ET WEB_SERVER PHP.//Input in HTTP POST TCP 80
2026-04-09 08:20:47 ET WEB_SERVER allow_url_include PHP config option in uri TCP 80
2026-04-09 08:20:47 ET WEB_SPECIFIC_APPS PHP-CGI OS Command Injection (soft hyphen) (CVE-2024-4577) TCP 80
2026-04-09 07:19:18 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-09 04:50:14 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-09 04:50:14 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-08 23:59:41 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-08 23:59:40 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80

 

Back to top