SCARD

Suspicious activity by IP address 206.135.169.143

Below is a list of the last 500 suspicious interactions with this IP.

Last observed Tue, 07 Apr 2026 10:03:41 (Australia/Brisbane)

Back to main list

Summary of suspicious activity by IP address 206.135.169.143

Description Count
ET EXPLOIT D-Link Devices Home Network Administration Protocol Command Execution 2
ET EXPLOIT Netgear DGN Remote Command Execution 2
SERVER-WEBAPP Netgear DGN1000 series routers authentication bypass attempt 2
ET WEB_SERVER WGET Command Specifying Output in HTTP Headers 2

Detailed activity by IP address 206.135.169.143

Timestamp Description Protocol Destination Port
2026-04-07 10:03:41 ET EXPLOIT D-Link Devices Home Network Administration Protocol Command Execution TCP 80
2026-04-07 10:03:41 ET EXPLOIT D-Link Devices Home Network Administration Protocol Command Execution TCP 80
2026-04-07 10:03:41 ET WEB_SERVER WGET Command Specifying Output in HTTP Headers TCP 80
2026-04-07 10:03:41 ET WEB_SERVER WGET Command Specifying Output in HTTP Headers TCP 80
2026-03-31 03:10:39 ET EXPLOIT Netgear DGN Remote Command Execution TCP 80
2026-03-31 03:10:39 SERVER-WEBAPP Netgear DGN1000 series routers authentication bypass attempt TCP 80
2026-03-31 03:10:39 ET EXPLOIT Netgear DGN Remote Command Execution TCP 80
2026-03-31 03:10:39 SERVER-WEBAPP Netgear DGN1000 series routers authentication bypass attempt TCP 80

 

Back to top