SCARD

Suspicious activity by IP address 45.230.66.111

Below is a list of the last 500 suspicious interactions with this IP.

Last observed Fri, 10 Apr 2026 02:24:32 (Australia/Brisbane)

Back to main list

Summary of suspicious activity by IP address 45.230.66.111

Description Count
ET SCAN Mirai Variant User-Agent (Inbound) 4
ET WEB_SPECIFIC_APPS MVPower CCTV DVR /shell JAWS Webserver Unauthenticated Remote Command Execution (CVE-2016-20016) 4
ET SCAN JAWS Webserver Unauthenticated Shell Command Execution 4
ET EXPLOIT MVPower DVR Shell UCE 4
ET HUNTING Suspicious Chmod Usage in URI (Inbound) 4
ET EXPLOIT D-Link Devices Home Network Administration Protocol Command Execution 2
SERVER-WEBAPP Netgear DGN1000 series routers authentication bypass attempt 2
ET EXPLOIT Netgear DGN Remote Command Execution 2
ET WEB_SERVER WGET Command Specifying Output in HTTP Headers 2

Detailed activity by IP address 45.230.66.111

Timestamp Description Protocol Destination Port
2026-04-10 02:24:32 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-04-10 02:24:32 ET SCAN JAWS Webserver Unauthenticated Shell Command Execution TCP 80
2026-04-10 02:24:32 ET SCAN Mirai Variant User-Agent (Inbound) TCP 80
2026-04-10 02:24:32 ET WEB_SPECIFIC_APPS MVPower CCTV DVR /shell JAWS Webserver Unauthenticated Remote Command Execution (CVE-2016-20016) TCP 80
2026-04-10 02:24:32 ET EXPLOIT MVPower DVR Shell UCE TCP 80
2026-04-10 02:24:31 ET SCAN Mirai Variant User-Agent (Inbound) TCP 80
2026-04-10 02:24:31 ET SCAN JAWS Webserver Unauthenticated Shell Command Execution TCP 80
2026-04-10 02:24:31 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-04-10 02:24:31 ET EXPLOIT MVPower DVR Shell UCE TCP 80
2026-04-10 02:24:31 ET WEB_SPECIFIC_APPS MVPower CCTV DVR /shell JAWS Webserver Unauthenticated Remote Command Execution (CVE-2016-20016) TCP 80
2026-04-07 22:50:32 ET WEB_SERVER WGET Command Specifying Output in HTTP Headers TCP 80
2026-04-07 22:50:32 ET WEB_SERVER WGET Command Specifying Output in HTTP Headers TCP 80
2026-04-07 22:50:32 ET EXPLOIT D-Link Devices Home Network Administration Protocol Command Execution TCP 80
2026-04-07 22:50:32 ET EXPLOIT D-Link Devices Home Network Administration Protocol Command Execution TCP 80
2026-04-03 10:39:51 ET EXPLOIT MVPower DVR Shell UCE TCP 80
2026-04-03 10:39:51 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-04-03 10:39:51 ET SCAN JAWS Webserver Unauthenticated Shell Command Execution TCP 80
2026-04-03 10:39:51 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80
2026-04-03 10:39:51 ET SCAN Mirai Variant User-Agent (Inbound) TCP 80
2026-04-03 10:39:51 ET WEB_SPECIFIC_APPS MVPower CCTV DVR /shell JAWS Webserver Unauthenticated Remote Command Execution (CVE-2016-20016) TCP 80
2026-04-03 10:39:51 ET EXPLOIT MVPower DVR Shell UCE TCP 80
2026-04-03 10:39:51 ET SCAN JAWS Webserver Unauthenticated Shell Command Execution TCP 80
2026-04-03 10:39:51 ET WEB_SPECIFIC_APPS MVPower CCTV DVR /shell JAWS Webserver Unauthenticated Remote Command Execution (CVE-2016-20016) TCP 80
2026-04-03 10:39:51 ET SCAN Mirai Variant User-Agent (Inbound) TCP 80
2026-04-01 01:33:50 SERVER-WEBAPP Netgear DGN1000 series routers authentication bypass attempt TCP 80
2026-04-01 01:33:50 ET EXPLOIT Netgear DGN Remote Command Execution TCP 80
2026-04-01 01:33:50 ET EXPLOIT Netgear DGN Remote Command Execution TCP 80
2026-04-01 01:33:50 SERVER-WEBAPP Netgear DGN1000 series routers authentication bypass attempt TCP 80

 

Back to top