SCARD

Suspicious activity by IP address 84.247.145.61

Below is a list of the last 500 suspicious interactions with this IP.

Last observed Wed, 01 Apr 2026 06:59:12 (Australia/Brisbane)

Back to main list

Summary of suspicious activity by IP address 84.247.145.61

Description Count
ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 13
ET WEB_SERVER PHP tags in HTTP POST 11
ET HUNTING Suspicious PHP Code in HTTP POST (Inbound) 11
ET WEB_SPECIFIC_APPS PHP-CGI OS Command Injection (soft hyphen) (CVE-2024-4577) 11
ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body 11
ET WEB_SERVER allow_url_include PHP config option in uri 11
ET WEB_SERVER auto_prepend_file PHP config option in uri 11
ET WEB_SERVER Generic PHP Remote File Include 11
ET WEB_SERVER PHP.//Input in HTTP POST 11
SERVER-WEBAPP PHP PHP-CGI command execution attempt 10

Detailed activity by IP address 84.247.145.61

Timestamp Description Protocol Destination Port
2026-04-01 06:59:12 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-01 06:59:12 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-01 05:53:47 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-04-01 05:53:47 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-03-27 21:29:10 SERVER-WEBAPP PHP PHP-CGI command execution attempt TCP 80
2026-03-27 21:29:10 ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body TCP 80
2026-03-27 21:29:10 ET WEB_SPECIFIC_APPS PHP-CGI OS Command Injection (soft hyphen) (CVE-2024-4577) TCP 80
2026-03-27 21:29:10 ET WEB_SERVER allow_url_include PHP config option in uri TCP 80
2026-03-27 21:29:10 ET WEB_SERVER auto_prepend_file PHP config option in uri TCP 80
2026-03-27 21:29:10 ET WEB_SERVER PHP.//Input in HTTP POST TCP 80
2026-03-27 21:29:10 ET WEB_SERVER PHP tags in HTTP POST TCP 80
2026-03-27 21:29:10 ET HUNTING Suspicious PHP Code in HTTP POST (Inbound) TCP 80
2026-03-27 21:29:10 ET WEB_SERVER Generic PHP Remote File Include TCP 80
2026-03-27 21:29:09 ET HUNTING Suspicious PHP Code in HTTP POST (Inbound) TCP 80
2026-03-27 21:29:09 ET WEB_SERVER PHP tags in HTTP POST TCP 80
2026-03-27 21:29:09 ET WEB_SERVER auto_prepend_file PHP config option in uri TCP 80
2026-03-27 21:29:09 ET WEB_SERVER allow_url_include PHP config option in uri TCP 80
2026-03-27 21:29:09 SERVER-WEBAPP PHP PHP-CGI command execution attempt TCP 80
2026-03-27 21:29:09 ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body TCP 80
2026-03-27 21:29:09 ET WEB_SPECIFIC_APPS PHP-CGI OS Command Injection (soft hyphen) (CVE-2024-4577) TCP 80
2026-03-27 21:29:09 ET WEB_SERVER Generic PHP Remote File Include TCP 80
2026-03-27 21:29:09 ET WEB_SERVER PHP.//Input in HTTP POST TCP 80
2026-03-27 20:27:43 SERVER-WEBAPP PHP PHP-CGI command execution attempt TCP 80
2026-03-27 20:27:43 ET WEB_SERVER PHP tags in HTTP POST TCP 80
2026-03-27 20:27:43 ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body TCP 80
2026-03-27 20:27:43 SERVER-WEBAPP PHP PHP-CGI command execution attempt TCP 80
2026-03-27 20:27:43 ET WEB_SERVER allow_url_include PHP config option in uri TCP 80
2026-03-27 20:27:43 ET HUNTING Suspicious PHP Code in HTTP POST (Inbound) TCP 80
2026-03-27 20:27:43 ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body TCP 80
2026-03-27 20:27:43 ET WEB_SPECIFIC_APPS PHP-CGI OS Command Injection (soft hyphen) (CVE-2024-4577) TCP 80
2026-03-27 20:27:43 ET WEB_SPECIFIC_APPS PHP-CGI OS Command Injection (soft hyphen) (CVE-2024-4577) TCP 80
2026-03-27 20:27:43 ET WEB_SERVER auto_prepend_file PHP config option in uri TCP 80
2026-03-27 20:27:43 ET WEB_SERVER Generic PHP Remote File Include TCP 80
2026-03-27 20:27:43 ET WEB_SERVER Generic PHP Remote File Include TCP 80
2026-03-27 20:27:43 ET WEB_SERVER auto_prepend_file PHP config option in uri TCP 80
2026-03-27 20:27:43 ET WEB_SERVER PHP tags in HTTP POST TCP 80
2026-03-27 20:27:43 ET WEB_SERVER allow_url_include PHP config option in uri TCP 80
2026-03-27 20:27:43 ET WEB_SERVER PHP.//Input in HTTP POST TCP 80
2026-03-27 20:27:43 ET HUNTING Suspicious PHP Code in HTTP POST (Inbound) TCP 80
2026-03-27 20:27:43 ET WEB_SERVER PHP.//Input in HTTP POST TCP 80
2026-03-27 20:27:42 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-03-27 20:27:42 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-03-27 18:25:32 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-03-27 18:25:32 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-03-27 04:54:57 ET HUNTING Suspicious PHP Code in HTTP POST (Inbound) TCP 80
2026-03-27 04:54:57 ET WEB_SERVER PHP tags in HTTP POST TCP 80
2026-03-27 04:54:57 ET WEB_SERVER Generic PHP Remote File Include TCP 80
2026-03-27 04:54:57 SERVER-WEBAPP PHP PHP-CGI command execution attempt TCP 80
2026-03-27 04:54:57 ET WEB_SERVER allow_url_include PHP config option in uri TCP 80
2026-03-27 04:54:57 ET WEB_SERVER PHP.//Input in HTTP POST TCP 80
2026-03-27 04:54:57 ET WEB_SERVER auto_prepend_file PHP config option in uri TCP 80
2026-03-27 04:54:57 ET WEB_SPECIFIC_APPS PHP-CGI OS Command Injection (soft hyphen) (CVE-2024-4577) TCP 80
2026-03-27 04:54:57 ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body TCP 80
2026-03-27 04:54:56 ET WEB_SERVER PHP tags in HTTP POST TCP 80
2026-03-27 04:54:56 ET WEB_SPECIFIC_APPS PHP-CGI OS Command Injection (soft hyphen) (CVE-2024-4577) TCP 80
2026-03-27 04:54:56 ET WEB_SERVER PHP.//Input in HTTP POST TCP 80
2026-03-27 04:54:56 ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body TCP 80
2026-03-27 04:54:56 ET WEB_SERVER auto_prepend_file PHP config option in uri TCP 80
2026-03-27 04:54:56 ET WEB_SERVER allow_url_include PHP config option in uri TCP 80
2026-03-27 04:54:56 ET HUNTING Suspicious PHP Code in HTTP POST (Inbound) TCP 80
2026-03-27 04:54:56 ET WEB_SERVER Generic PHP Remote File Include TCP 80
2026-03-27 04:54:56 SERVER-WEBAPP PHP PHP-CGI command execution attempt TCP 80
2026-03-27 03:53:28 SERVER-WEBAPP PHP PHP-CGI command execution attempt TCP 80
2026-03-27 03:53:28 ET WEB_SERVER allow_url_include PHP config option in uri TCP 80
2026-03-27 03:53:28 ET WEB_SERVER Generic PHP Remote File Include TCP 80
2026-03-27 03:53:28 ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body TCP 80
2026-03-27 03:53:28 ET WEB_SERVER auto_prepend_file PHP config option in uri TCP 80
2026-03-27 03:53:28 ET WEB_SERVER Generic PHP Remote File Include TCP 80
2026-03-27 03:53:28 ET HUNTING Suspicious PHP Code in HTTP POST (Inbound) TCP 80
2026-03-27 03:53:28 ET WEB_SERVER PHP.//Input in HTTP POST TCP 80
2026-03-27 03:53:28 SERVER-WEBAPP PHP PHP-CGI command execution attempt TCP 80
2026-03-27 03:53:28 ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body TCP 80
2026-03-27 03:53:28 ET WEB_SERVER PHP.//Input in HTTP POST TCP 80
2026-03-27 03:53:28 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-03-27 03:53:28 ET WEB_SERVER allow_url_include PHP config option in uri TCP 80
2026-03-27 03:53:28 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-03-27 03:53:28 ET HUNTING Suspicious PHP Code in HTTP POST (Inbound) TCP 80
2026-03-27 03:53:28 ET WEB_SPECIFIC_APPS PHP-CGI OS Command Injection (soft hyphen) (CVE-2024-4577) TCP 80
2026-03-27 03:53:28 ET WEB_SERVER PHP tags in HTTP POST TCP 80
2026-03-27 03:53:28 ET WEB_SERVER auto_prepend_file PHP config option in uri TCP 80
2026-03-27 03:53:28 ET WEB_SERVER PHP tags in HTTP POST TCP 80
2026-03-27 03:53:28 ET WEB_SPECIFIC_APPS PHP-CGI OS Command Injection (soft hyphen) (CVE-2024-4577) TCP 80
2026-03-26 21:33:28 ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body TCP 80
2026-03-26 21:33:28 ET WEB_SERVER allow_url_include PHP config option in uri TCP 80
2026-03-26 21:33:28 ET WEB_SERVER PHP.//Input in HTTP POST TCP 80
2026-03-26 21:33:28 ET WEB_SPECIFIC_APPS PHP-CGI OS Command Injection (soft hyphen) (CVE-2024-4577) TCP 80
2026-03-26 21:33:28 ET HUNTING Suspicious PHP Code in HTTP POST (Inbound) TCP 80
2026-03-26 21:33:28 ET WEB_SERVER Generic PHP Remote File Include TCP 80
2026-03-26 21:33:28 ET WEB_SERVER auto_prepend_file PHP config option in uri TCP 80
2026-03-26 21:33:28 ET WEB_SERVER PHP tags in HTTP POST TCP 80
2026-03-26 21:33:27 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-03-26 18:34:57 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-03-26 18:34:56 ET EXPLOIT Apache HTTP Server - Path Traversal Attempt (CVE-2021-42013) M2 TCP 80
2026-03-25 22:43:02 ET WEB_SERVER allow_url_include PHP config option in uri TCP 80
2026-03-25 22:43:02 ET WEB_SERVER auto_prepend_file PHP config option in uri TCP 80
2026-03-25 22:43:02 ET WEB_SERVER PHP tags in HTTP POST TCP 80
2026-03-25 22:43:02 SERVER-WEBAPP PHP PHP-CGI command execution attempt TCP 80
2026-03-25 22:43:02 ET WEB_SERVER PHP.//Input in HTTP POST TCP 80
2026-03-25 22:43:02 ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body TCP 80
2026-03-25 22:43:02 ET WEB_SERVER Generic PHP Remote File Include TCP 80
2026-03-25 22:43:02 ET HUNTING Suspicious PHP Code in HTTP POST (Inbound) TCP 80
2026-03-25 22:43:02 ET WEB_SPECIFIC_APPS PHP-CGI OS Command Injection (soft hyphen) (CVE-2024-4577) TCP 80
2026-03-25 22:43:01 ET WEB_SERVER auto_prepend_file PHP config option in uri TCP 80
2026-03-25 22:43:01 ET WEB_SPECIFIC_APPS PHP-CGI OS Command Injection (soft hyphen) (CVE-2024-4577) TCP 80
2026-03-25 22:43:01 ET WEB_SERVER PHP.//Input in HTTP POST TCP 80
2026-03-25 22:43:01 ET WEB_SERVER PHP tags in HTTP POST TCP 80
2026-03-25 22:43:01 SERVER-WEBAPP PHP PHP-CGI command execution attempt TCP 80
2026-03-25 22:43:01 ET WEB_SERVER allow_url_include PHP config option in uri TCP 80
2026-03-25 22:43:01 ET HUNTING Suspicious PHP Code in HTTP POST (Inbound) TCP 80
2026-03-25 22:43:01 ET WEB_SERVER Generic PHP Remote File Include TCP 80
2026-03-25 22:43:01 ET WEB_SERVER Possible SQL Injection (exec) in HTTP Request Body TCP 80

 

Back to top