SCARD

Suspicious activity by IP address 206.135.161.159

Below is a list of the last 500 suspicious interactions with this IP.

Last observed Sun, 05 Apr 2026 06:53:29 (Australia/Brisbane)

Back to main list

Summary of suspicious activity by IP address 206.135.161.159

Description Count
ET HUNTING Suspicious Chmod Usage in URI (Inbound) 3
ET SCAN Mirai Variant User-Agent (Inbound) 2
ET EXPLOIT MVPower DVR Shell UCE 2
ET WEB_SPECIFIC_APPS MVPower CCTV DVR /shell JAWS Webserver Unauthenticated Remote Command Execution (CVE-2016-20016) 2
ET SCAN JAWS Webserver Unauthenticated Shell Command Execution 2
ET EXPLOIT Possible Vacron NVR Remote Command Execution 1

Detailed activity by IP address 206.135.161.159

Timestamp Description Protocol Destination Port
2026-04-05 06:53:29 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 8080
2026-04-05 06:53:29 ET EXPLOIT Possible Vacron NVR Remote Command Execution TCP 8080
2026-03-26 15:59:05 ET SCAN Mirai Variant User-Agent (Inbound) TCP 80
2026-03-26 15:59:05 ET SCAN Mirai Variant User-Agent (Inbound) TCP 80
2026-03-26 15:59:05 ET EXPLOIT MVPower DVR Shell UCE TCP 80
2026-03-26 15:59:05 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-03-26 15:59:05 ET WEB_SPECIFIC_APPS MVPower CCTV DVR /shell JAWS Webserver Unauthenticated Remote Command Execution (CVE-2016-20016) TCP 80
2026-03-26 15:59:05 ET EXPLOIT MVPower DVR Shell UCE TCP 80
2026-03-26 15:59:05 ET SCAN JAWS Webserver Unauthenticated Shell Command Execution TCP 80
2026-03-26 15:59:05 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-03-26 15:59:05 ET SCAN JAWS Webserver Unauthenticated Shell Command Execution TCP 80
2026-03-26 15:59:05 ET WEB_SPECIFIC_APPS MVPower CCTV DVR /shell JAWS Webserver Unauthenticated Remote Command Execution (CVE-2016-20016) TCP 80

 

Back to top