Details

_id 5fb8fb0c4d1f714726bd99af
reference ['https://twitter.com/bad_packets/status/1329919975255990272/photo/1', 'https://www.virustotal.com/gui/url/33698f18e9bebc5036c42cee3c59cfd0c34b423632dd70ad52ca6852143d043e/details']
md5 []
sha1 []
sha256 ['33698f18e9bebc5036c42cee3c59cfd0c34b423632dd70ad52ca6852143d043e']
mail []
ip ['75.127.6.23']
domain []
url ['http://75.127.6.23/SBIDIOT']
user bad_packets
tweet Active DDoS malware command-and-control (C2) server detected. IP address: 75.127.6.23 (🇺🇸) Hosting provider: VirMach (AS36352) C2 ports: 666/tcp 775/tcp Payload: https://www.virustotal.com/gui/url/33698f18e9bebc5036c42cee3c59cfd0c34b423632dd70ad52ca6852143d043e/details http://75.127.6.23/SBIDIOT/ #opendir Exploit target: CVE-2017-17215 #threatintel https://twitter.com/bad_packets/status/1329919975255990272/photo/1
id 1329919975255990272
retweets 8
link https://twitter.com/bad_packets/status/1329919975255990272
mentions []
hashtags ['#opendir', '#threatintel']
date 2020-11-20 22:50:05
timestamp 1605909005

Tweet