Details

_id 5efbb659353352821661a2fd
reference ['https://www.virustotal.com/gui/url/996c5b5e8b4914b618275372fa01623bae1041a9a7e0ac52a2684abcd33e8db9/details', 'https://kb.cert.org/vuls/id/582384/']
md5 []
sha1 []
sha256 ['996c5b5e8b4914b618275372fa01623bae1041a9a7e0ac52a2684abcd33e8db9']
mail []
ip ['5.206.227.228', '159.65.155.229']
domain []
url ['http://5.206.227.228/mb']
user bad_packets
tweet Active #DDoS malware payload detected: http://5.206.227.228/mb ( https://www.virustotal.com/gui/url/996c5b5e8b4914b618275372fa01623bae1041a9a7e0ac52a2684abcd33e8db9/details …) Hosting provider: BlazingFast (AS49349) Exploit attempt source IP: 159.65.155.229 () Target: Netgear router remote code execution vulnerability ( https://kb.cert.org/vuls/id/582384/ ) #threatintel pic.twitter.com/1K6mJvUYAZ
id 1278083837096951809
retweets 0
favorites 1
link https://twitter.com/bad_packets/status/1278083837096951809
mentions []
hashtags ['#DDoS', '#threatintel']
timestamp 1593553907
date 2020-06-30 23:51:47

Tweet