Loading threats
Matches HTTP POST body patterns targeting the WordPress Smart Manager woo-json.php endpoint where the edited parameter contains URL-encoded SQL injection content using a UNION SELECT SLEEP() time-delay payload. This primitive is useful for identifying automated exploitation attempts or manual probing activity attempting to validate SQL injection vulnerability through response timing manipulation.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 162.243.10.249 | 58% | 3 | 3 | 🇺🇸 US | AS14061 | 2026-03-19 |