SCARD

Suspicious activity by IP address 45.230.66.102

Below is a list of the last 500 suspicious interactions with this IP.

Last observed Tue, 07 Apr 2026 10:35:48 (Australia/Brisbane)

Back to main list

Summary of suspicious activity by IP address 45.230.66.102

Description Count
ET EXPLOIT D-Link Devices Home Network Administration Protocol Command Execution 3
ET WEB_SERVER WGET Command Specifying Output in HTTP Headers 3
ET EXPLOIT Netgear DGN Remote Command Execution 2
SERVER-WEBAPP Netgear DGN1000 series routers authentication bypass attempt 2

Detailed activity by IP address 45.230.66.102

Timestamp Description Protocol Destination Port
2026-04-07 10:35:48 ET EXPLOIT D-Link Devices Home Network Administration Protocol Command Execution TCP 80
2026-04-07 10:35:48 ET WEB_SERVER WGET Command Specifying Output in HTTP Headers TCP 80
2026-03-29 23:49:33 ET WEB_SERVER WGET Command Specifying Output in HTTP Headers TCP 80
2026-03-29 23:49:33 ET EXPLOIT D-Link Devices Home Network Administration Protocol Command Execution TCP 80
2026-03-29 23:49:32 ET EXPLOIT D-Link Devices Home Network Administration Protocol Command Execution TCP 80
2026-03-29 23:49:32 ET WEB_SERVER WGET Command Specifying Output in HTTP Headers TCP 80
2026-03-26 20:36:13 SERVER-WEBAPP Netgear DGN1000 series routers authentication bypass attempt TCP 80
2026-03-26 20:36:13 ET EXPLOIT Netgear DGN Remote Command Execution TCP 80
2026-03-26 20:36:11 ET EXPLOIT Netgear DGN Remote Command Execution TCP 80
2026-03-26 20:36:11 SERVER-WEBAPP Netgear DGN1000 series routers authentication bypass attempt TCP 80

 

Back to top