SCARD

Suspicious activity by IP address 45.230.66.119

Below is a list of the last 500 suspicious interactions with this IP.

Last observed Sat, 04 Apr 2026 01:39:45 (Australia/Brisbane)

Back to main list

Summary of suspicious activity by IP address 45.230.66.119

Description Count
ET SCAN JAWS Webserver Unauthenticated Shell Command Execution 1
ET EXPLOIT MVPower DVR Shell UCE 1
ET WEB_SPECIFIC_APPS MVPower CCTV DVR /shell JAWS Webserver Unauthenticated Remote Command Execution (CVE-2016-20016) 1
ET WEB_SERVER WGET Command Specifying Output in HTTP Headers 1
ET SCAN Mirai Variant User-Agent (Inbound) 1
ET EXPLOIT D-Link Devices Home Network Administration Protocol Command Execution 1
ET INFO Netlink GPON Login Attempt (GET) 1
ET HUNTING Suspicious Chmod Usage in URI (Inbound) 1

Detailed activity by IP address 45.230.66.119

Timestamp Description Protocol Destination Port
2026-04-04 01:39:45 ET INFO Netlink GPON Login Attempt (GET) TCP 80
2026-04-03 13:14:29 ET WEB_SERVER WGET Command Specifying Output in HTTP Headers TCP 80
2026-04-03 13:14:29 ET EXPLOIT D-Link Devices Home Network Administration Protocol Command Execution TCP 80
2026-03-28 21:31:45 ET SCAN JAWS Webserver Unauthenticated Shell Command Execution TCP 80
2026-03-28 21:31:45 ET EXPLOIT MVPower DVR Shell UCE TCP 80
2026-03-28 21:31:45 ET WEB_SPECIFIC_APPS MVPower CCTV DVR /shell JAWS Webserver Unauthenticated Remote Command Execution (CVE-2016-20016) TCP 80
2026-03-28 21:31:45 ET SCAN Mirai Variant User-Agent (Inbound) TCP 80
2026-03-28 21:31:45 ET HUNTING Suspicious Chmod Usage in URI (Inbound) TCP 80

 

Back to top