Congratulations,
Dumbass

> cat /var/log/your-failures.log_

A very special round of applause for 213.174.148.161 for their valiant — and entirely unsuccessful — attempt to compromise our systems. We truly couldn't have done it without you. Well, actually we could. We did. You failed.

We Might Not Know Where You Live, But...

Did you think you were anonymous? That's adorable. Here's what we know about you:

IP Address 213.174.148.161
Country Netherlands
Region Unknown
City Unknown
ISP / Org Unknown
Timezone Unknown
Coordinates 52.3824, 4.8995

Your Digital Fingerprint

Nice browser you've got there. It'd be a shame if someone… logged it.

Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:121.0) Gecko/20100101 Firefox/121.0
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:140.0) Gecko/20100101 Firefox/140.0
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36

Your Hall of Shame

Every single one of your pathetic attempts, lovingly preserved for posterity. Spoiler alert: they all failed.

Attack Breakdown

158
SQL Injection
110
Server-Side Request Forgery
268
Total Failed Attempts

Detailed Activity Log

# Timestamp Attack Type Method Target URI Detail
1 2026-02-13T10:37:30Z SQL Injection GET /industries/engineering sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
2 2026-02-13T10:37:30Z Server-Side Request Forgery GET /industries/legal ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
3 2026-02-23T02:54:21Z Server-Side Request Forgery GET /blog/the-role-of-ai-in-modern-cyber-defense-enhancing-security-with-machine-learning ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
4 2026-02-27T10:35:01Z Server-Side Request Forgery GET /services/security-operations-centre/detect ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
5 2026-02-27T10:55:51Z SQL Injection GET /services/security-operations-centre/detect sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
6 2026-03-07T05:42:29Z Server-Side Request Forgery GET /blog/evidence-screenshots-and-reproduction-steps ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
7 2026-03-11T07:40:36Z SQL Injection GET /industries/transportation-and-logistics sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
8 2026-03-11T07:40:36Z Server-Side Request Forgery GET /industries/healthcare ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
9 2026-03-11T07:40:36Z SQL Injection GET /industries/energy-and-utilites sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
10 2026-03-11T07:40:36Z Server-Side Request Forgery GET /industries/financial-services ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
11 2026-03-11T07:40:36Z Server-Side Request Forgery GET /services/security-operations-centre/detect ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
12 2026-03-12T15:52:26Z SQL Injection GET /services/security-operations-centre/detect sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
13 2026-03-18T17:40:02Z Server-Side Request Forgery GET /services/security-operations-centre/detect ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
14 2026-03-20T14:41:13Z SQL Injection GET /services/security-operations-centre/detect sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
15 2026-03-20T16:00:34Z SQL Injection GET /services/security-operations-centre/detect sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
16 2026-03-21T11:57:51Z Server-Side Request Forgery GET /blog/penetration-testing-methodology-walkthrough ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
17 2026-03-22T07:42:56Z SQL Injection GET /blog/reconnaissance-and-osint-in-penetration-testing sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
18 2026-03-23T06:22:53Z SQL Injection GET /blog/writing-findings-teams-can-remediate sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
19 2026-03-23T11:55:10Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
20 2026-03-23T13:22:00Z SQL Injection GET /blog/penetration-testing-business-risk sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
21 2026-03-23T15:28:09Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
22 2026-03-24T02:07:47Z Server-Side Request Forgery GET /blog/penetration-testing-business-risk ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
23 2026-03-24T10:41:53Z SQL Injection GET /blog/from-the-hacker-desk-exploiting-trust-between-offices sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
24 2026-03-24T10:41:53Z SQL Injection GET /blog/apt33-the-aerospace-stalker sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
25 2026-03-24T10:52:56Z SQL Injection GET /blog/from-the-hacker-desk-exploiting-trust-between-offices sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
26 2026-03-24T10:52:56Z Server-Side Request Forgery GET /blog/penetration-testing-business-risk ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
27 2026-03-24T10:52:56Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-wifi-car-park ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
28 2026-03-24T14:43:01Z SQL Injection GET /blog/apt33-the-aerospace-stalker sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
29 2026-03-24T15:13:11Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-guest-wifi-sensitive-data ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
30 2026-03-24T15:42:14Z SQL Injection GET /blog/from-the-hacker-desk-intern-laptop-beachhead sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
31 2026-03-24T15:52:18Z SQL Injection GET /blog/from-the-hacker-desk-intern-laptop-beachhead sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
32 2026-03-25T09:43:06Z SQL Injection GET /blog/from-the-hacker-desk-lift-reconnaissance-platform sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
33 2026-03-25T10:44:05Z SQL Injection GET /blog/from-the-hacker-desk-lift-reconnaissance-platform sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
34 2026-03-25T12:03:08Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
35 2026-03-25T12:32:29Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-lift-reconnaissance-platform ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
36 2026-03-25T13:58:34Z SQL Injection GET /blog/from-the-hacker-desk-vlan-not-segmented sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
37 2026-03-25T13:58:34Z SQL Injection GET /blog/from-the-hacker-desk-lift-reconnaissance-platform sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
38 2026-03-25T14:13:59Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-printer-domain-admin ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
39 2026-03-25T14:58:11Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-exploiting-trust-between-offices ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
40 2026-03-25T14:58:11Z SQL Injection GET /blog/from-the-hacker-desk-vlan-not-segmented sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
41 2026-03-25T17:37:28Z Server-Side Request Forgery GET /blog/privilege-escalation-explained ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
42 2026-03-25T17:59:48Z Server-Side Request Forgery GET /blog/penetration-testing-incident-preparedness-breach-pathways ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
43 2026-03-25T23:36:59Z SQL Injection GET /blog/mature-penetration-testing-programme-multi-year sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
44 2026-03-26T02:13:04Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
45 2026-03-26T04:30:21Z SQL Injection GET /blog/from-the-hacker-desk-default-credentials-ics sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
46 2026-03-26T07:24:58Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-vlan-not-segmented ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
47 2026-03-26T07:24:58Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
48 2026-03-26T07:52:27Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
49 2026-03-26T08:45:29Z Server-Side Request Forgery GET /blog/penetration-testing-risk-management-governance ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
50 2026-03-26T08:53:24Z SQL Injection GET /blog/from-the-hacker-desk-superyacht-keylock sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
51 2026-03-26T09:09:52Z SQL Injection GET /blog/penetration-testing-risk-management-governance sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
52 2026-03-26T10:27:42Z SQL Injection GET /blog/from-the-hacker-desk-backup-systems-attack-vector sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
53 2026-03-26T10:41:25Z Server-Side Request Forgery GET /blog/penetration-testing-risk-management-governance ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
54 2026-03-26T10:59:49Z SQL Injection GET /blog/from-the-hacker-desk-coffee-machine sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
55 2026-03-26T11:29:12Z SQL Injection GET /blog/identity-authentication-access-control sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
56 2026-03-26T14:43:09Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-cctv-intelligence-hub ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
57 2026-03-26T15:24:29Z SQL Injection GET /blog/from-the-hacker-desk-superyacht-keylock sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
58 2026-03-26T16:57:03Z SQL Injection GET /blog/from-the-hacker-desk-lift-reconnaissance-platform sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
59 2026-03-26T17:06:52Z SQL Injection GET /blog/from-the-hacker-desk-superyacht-keylock sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
60 2026-03-26T17:12:58Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
61 2026-03-26T19:50:28Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-default-credentials-ics ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
62 2026-03-27T07:27:23Z SQL Injection GET /blog/from-the-hacker-desk-phishing-finance-director sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
63 2026-03-27T11:06:35Z SQL Injection GET /blog/from-the-hacker-desk-superyacht-keylock sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
64 2026-03-27T11:21:27Z SQL Injection GET /blog/from-the-hacker-desk-smart-building-management-system sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
65 2026-03-27T11:21:27Z SQL Injection GET /blog/from-the-hacker-desk-exploiting-trust-between-offices sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
66 2026-03-27T11:21:27Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-cctv-intelligence-hub ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
67 2026-03-27T11:21:27Z SQL Injection GET /blog/from-the-hacker-desk-printer-domain-admin sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
68 2026-03-27T12:55:54Z Server-Side Request Forgery GET /blog/questions-before-commissioning-penetration-test ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
69 2026-03-27T14:17:02Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
70 2026-03-27T14:19:51Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-vlan-not-segmented ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
71 2026-03-27T14:34:48Z Server-Side Request Forgery GET /blog/netntlmv2-hash-cracking-and-legacy-authentication ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
72 2026-03-27T14:56:45Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-guest-wifi-sensitive-data ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
73 2026-03-27T15:14:28Z SQL Injection GET /blog/nmap-deep-dive-vulnerability-scanning-and-penetration-testing sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
74 2026-03-27T15:38:51Z SQL Injection GET /blog/from-the-hacker-desk-guest-wifi-sensitive-data sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
75 2026-03-27T15:41:54Z SQL Injection GET /blog/from-the-hacker-desk-guest-wifi-sensitive-data sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
76 2026-03-27T15:54:57Z SQL Injection GET /blog/from-the-hacker-desk-vlan-not-segmented sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
77 2026-03-27T17:07:02Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
78 2026-03-27T17:47:15Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
79 2026-03-27T18:04:11Z SQL Injection GET /blog/from-the-hacker-desk-guest-wifi-sensitive-data sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
80 2026-03-27T18:04:11Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
81 2026-03-28T13:34:36Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
82 2026-03-28T13:34:36Z SQL Injection GET /blog/from-the-hacker-desk-vlan-not-segmented sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
83 2026-03-28T16:02:21Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
84 2026-03-28T16:26:19Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
85 2026-03-28T16:49:18Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
86 2026-03-29T20:55:52Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
87 2026-03-30T02:24:20Z Server-Side Request Forgery GET /blog/identity-authentication-access-control ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
88 2026-03-30T09:00:07Z SQL Injection GET /blog/penetration-testing-and-defensive-security sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
89 2026-03-30T23:05:45Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
90 2026-03-31T19:24:06Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
91 2026-03-31T20:00:09Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-cctv-intelligence-hub ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
92 2026-03-31T21:37:05Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
93 2026-03-31T21:44:05Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
94 2026-04-01T09:01:13Z SQL Injection GET /blog/transparency-penetration-testing-builds-trust sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
95 2026-04-01T10:12:19Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
96 2026-04-01T14:55:55Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
97 2026-04-03T06:08:51Z SQL Injection GET /blog/from-the-hacker-desk-vlan-not-segmented sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
98 2026-04-04T02:37:28Z SQL Injection GET /blog/from-the-hacker-desk-wifi-car-park sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
99 2026-04-04T06:28:28Z Server-Side Request Forgery GET /blog/penetration-testing-and-defensive-security ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
100 2026-04-04T08:21:32Z SQL Injection GET /blog/from-the-hacker-desk-lift-reconnaissance-platform sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
101 2026-04-04T09:55:00Z Server-Side Request Forgery GET /blog/pen-test-reports-prioritise-security-investment ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
102 2026-04-04T14:46:59Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
103 2026-04-04T14:46:59Z SQL Injection GET /blog/from-the-hacker-desk-drone-to-network-pivot sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
104 2026-04-06T15:16:16Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
105 2026-04-07T14:40:17Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-lift-reconnaissance-platform ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
106 2026-04-08T13:47:13Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
107 2026-04-09T08:38:42Z SQL Injection GET /blog/pentesting-ai-engines-and-guardrails sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
108 2026-04-09T15:33:08Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-wifi-car-park ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
109 2026-04-10T04:24:40Z SQL Injection GET /blog/internal-vs-external-penetration-testing sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
110 2026-04-10T07:11:21Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
111 2026-04-10T11:54:27Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
112 2026-04-10T13:31:10Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
113 2026-04-10T14:34:18Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
114 2026-04-10T16:39:29Z SQL Injection GET /blog/apt1-the-persistent-data-hoarder sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
115 2026-04-10T17:12:14Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-cctv-intelligence-hub ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
116 2026-04-10T17:12:14Z SQL Injection GET /blog/from-the-hacker-desk-social-engineering-reception sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
117 2026-04-11T05:33:57Z SQL Injection GET /blog/from-the-hacker-desk-social-engineering-reception sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
118 2026-04-11T05:33:57Z SQL Injection GET /blog/from-the-hacker-desk-cctv-intelligence-hub sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
119 2026-04-11T05:59:26Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
120 2026-04-11T10:07:21Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
121 2026-04-11T17:51:12Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
122 2026-04-12T16:29:21Z SQL Injection GET /blog/penetration-testing-secure-architecture-design sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
123 2026-04-12T22:26:19Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
124 2026-04-12T23:45:06Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
125 2026-04-13T17:24:57Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
126 2026-04-14T00:43:07Z SQL Injection GET /blog/from-the-hacker-desk-gps-spoofing-patrol-drone sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
127 2026-04-14T14:16:26Z SQL Injection GET /blog/from-the-hacker-desk-backup-systems-attack-vector sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
128 2026-04-14T15:55:24Z SQL Injection GET /blog/penetration-testing-and-defensive-security sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
129 2026-04-14T16:05:05Z Server-Side Request Forgery GET /blog/penetration-testing-and-defensive-security ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
130 2026-04-15T03:21:00Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
131 2026-04-15T11:06:16Z SQL Injection GET /blog/internal-vs-external-penetration-testing sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
132 2026-04-15T11:21:15Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-coffee-machine ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
133 2026-04-16T07:36:46Z SQL Injection GET /blog/from-the-hacker-desk-lift-reconnaissance-platform sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
134 2026-04-16T16:58:20Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
135 2026-04-16T20:41:13Z Server-Side Request Forgery GET /blog/penetration-testing-secure-architecture-design ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
136 2026-04-17T02:31:16Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
137 2026-04-17T02:32:43Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
138 2026-04-17T06:47:36Z Server-Side Request Forgery GET /blog/penetration-testing-secure-architecture-design ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
139 2026-04-17T06:47:37Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
140 2026-04-17T12:28:01Z Server-Side Request Forgery GET /blog/internal-vs-external-penetration-testing ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
141 2026-04-17T13:23:11Z Server-Side Request Forgery GET /blog/internal-vs-external-penetration-testing ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
142 2026-04-17T18:14:58Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
143 2026-04-18T09:03:28Z SQL Injection GET /blog/from-the-hacker-desk-phishing-finance-director sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
144 2026-04-18T16:49:47Z Server-Side Request Forgery GET /blog/internal-vs-external-penetration-testing ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
145 2026-04-19T10:44:38Z Server-Side Request Forgery GET /blog/netntlmv2-hash-cracking-and-legacy-authentication ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
146 2026-04-19T11:19:45Z SQL Injection GET /blog/privilege-escalation-explained sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
147 2026-04-19T12:03:34Z SQL Injection GET /blog/netntlmv2-hash-cracking-and-legacy-authentication sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
148 2026-04-19T12:03:34Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-cracking-passwords-afternoon ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
149 2026-04-19T13:38:10Z SQL Injection GET /blog/from-the-hacker-desk-cracking-passwords-afternoon sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
150 2026-04-19T13:38:10Z Server-Side Request Forgery GET /blog/netntlmv2-hash-cracking-and-legacy-authentication ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
151 2026-04-19T14:19:22Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-social-engineering-reception ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
152 2026-04-19T20:14:00Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
153 2026-04-19T20:20:13Z SQL Injection GET /blog/common-penetration-testing-types-explained sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
154 2026-04-20T03:49:42Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
155 2026-04-20T20:27:50Z SQL Injection GET /blog/from-the-hacker-desk-superyacht-keylock sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
156 2026-04-21T11:04:19Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
157 2026-04-21T18:59:13Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
158 2026-04-21T21:44:51Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
159 2026-04-22T06:04:05Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
160 2026-04-22T18:50:08Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
161 2026-04-23T07:26:50Z SQL Injection GET /blog/nmap-deep-dive-vulnerability-scanning-and-penetration-testing sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
162 2026-04-23T12:12:22Z Server-Side Request Forgery GET /blog/chaining-low-risk-findings ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
163 2026-04-23T12:12:22Z SQL Injection GET /blog/transparency-penetration-testing-builds-trust sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
164 2026-04-23T13:46:35Z SQL Injection GET /blog/from-the-hacker-desk-backup-systems-attack-vector sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
165 2026-04-23T21:05:46Z SQL Injection GET /blog/internal-vs-external-penetration-testing sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
166 2026-04-24T00:38:00Z SQL Injection GET /blog/from-the-hacker-desk-vlan-not-segmented sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
167 2026-04-24T00:38:00Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-guest-wifi-sensitive-data ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
168 2026-04-24T14:21:58Z SQL Injection GET /blog/from-the-hacker-desk-guest-wifi-sensitive-data sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
169 2026-04-25T06:43:50Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
170 2026-04-25T10:01:31Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
171 2026-04-25T14:05:21Z SQL Injection GET /blog/responsible-proof-of-concept sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
172 2026-04-25T14:45:19Z SQL Injection GET /blog/privilege-escalation-explained sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
173 2026-04-25T15:04:56Z Server-Side Request Forgery GET /blog/privilege-escalation-explained ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
174 2026-04-25T15:16:56Z SQL Injection GET /blog/privilege-escalation-explained sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
175 2026-04-25T15:22:38Z SQL Injection GET /blog/privilege-escalation-explained sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
176 2026-04-25T19:15:25Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-social-engineering-reception ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
177 2026-04-26T01:21:32Z SQL Injection GET /blog/from-the-hacker-desk-vlan-not-segmented sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
178 2026-04-26T10:02:50Z SQL Injection GET /blog/from-the-hacker-desk-misconfigured-api-endpoints sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
179 2026-04-26T14:52:22Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
180 2026-04-27T01:54:34Z SQL Injection GET /blog/from-the-hacker-desk-coffee-machine sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
181 2026-04-27T07:54:33Z SQL Injection GET /blog/how-attackers-think sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
182 2026-04-27T08:10:24Z SQL Injection GET /blog/from-the-hacker-desk-social-engineering-reception sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
183 2026-04-27T10:52:37Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
184 2026-04-27T11:05:53Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
185 2026-04-28T06:16:03Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-drone-to-network-pivot ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
186 2026-04-28T08:00:24Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
187 2026-04-28T09:55:04Z SQL Injection GET /blog/from-the-hacker-desk-exploiting-trust-between-offices sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
188 2026-04-28T11:46:38Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
189 2026-04-28T20:40:50Z SQL Injection GET /blog/from-the-hacker-desk-forgotten-test-server sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
190 2026-04-28T23:12:04Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
191 2026-04-29T04:23:12Z SQL Injection GET /blog/from-the-hacker-desk-vlan-not-segmented sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
192 2026-04-29T04:23:35Z SQL Injection GET /blog/netntlmv2-hash-cracking-and-legacy-authentication sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
193 2026-04-29T04:49:23Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-vlan-not-segmented ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
194 2026-04-29T04:49:45Z SQL Injection GET /blog/netntlmv2-hash-cracking-and-legacy-authentication sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
195 2026-04-29T10:07:42Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
196 2026-04-29T11:26:03Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
197 2026-04-29T12:36:03Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
198 2026-04-29T13:56:52Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
199 2026-04-30T04:24:42Z SQL Injection GET /blog/from-the-hacker-desk-misconfigured-api-endpoints sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
200 2026-04-30T17:33:31Z SQL Injection GET /blog/reconnaissance-and-osint-in-penetration-testing sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
201 2026-04-30T19:33:44Z Server-Side Request Forgery GET /blog/ ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
202 2026-05-01T08:03:36Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
203 2026-05-01T15:33:26Z SQL Injection GET /blog/what-are-tarpits sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
204 2026-05-01T17:02:09Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-intern-laptop-beachhead ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
205 2026-05-01T17:07:25Z SQL Injection GET /blog/ sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
206 2026-05-02T02:59:19Z SQL Injection GET /blog/what-is-spear-phishing sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
207 2026-05-02T04:30:46Z Server-Side Request Forgery GET /blog/what-is-spear-phishing ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
208 2026-05-02T15:43:22Z SQL Injection GET /blog/openvas-deep-dive-vulnerability-scanning sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
209 2026-05-02T18:53:04Z SQL Injection GET /blog/wifi-penetration-testing-of-companies sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
210 2026-05-02T20:02:27Z SQL Injection GET /blog/wifi-penetration-testing-of-companies sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
211 2026-05-02T20:07:27Z Server-Side Request Forgery GET /blog/wifi-penetration-testing-of-companies ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
212 2026-05-02T20:28:55Z Server-Side Request Forgery GET /blog/wifi-penetration-testing-of-companies ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
213 2026-05-03T05:01:36Z SQL Injection GET /blog/apt3 sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
214 2026-05-04T10:39:35Z Server-Side Request Forgery GET /blog/apt3 ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
215 2026-05-04T21:42:15Z SQL Injection GET /blog/openvas-deep-dive-vulnerability-scanning sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
216 2026-05-05T13:10:38Z SQL Injection GET /blog/what-is-spear-phishing sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
217 2026-05-05T15:12:29Z SQL Injection GET /blog/openvas-deep-dive-vulnerability-scanning sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
218 2026-05-05T15:12:30Z SQL Injection GET /blog/apt15 sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
219 2026-05-05T15:21:11Z Server-Side Request Forgery GET /blog/what-is-spear-phishing ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
220 2026-05-05T15:21:30Z SQL Injection GET /blog/what-is-spear-phishing sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
221 2026-05-05T15:38:28Z SQL Injection GET /blog/openvas-deep-dive-vulnerability-scanning sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
222 2026-05-05T15:38:33Z Server-Side Request Forgery GET /blog/apt15 ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
223 2026-05-06T20:25:18Z Server-Side Request Forgery GET /blog/no-critical-findings-does-not-mean-secure ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
224 2026-05-06T20:27:25Z SQL Injection GET /blog/no-critical-findings-does-not-mean-secure sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
225 2026-05-07T10:22:35Z SQL Injection GET /blog/what-is-spear-phishing sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
226 2026-05-07T11:21:49Z SQL Injection GET /blog/xml-external-entity-attack sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
227 2026-05-07T13:13:23Z Server-Side Request Forgery GET /blog/what-is-spear-phishing ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
228 2026-05-07T14:31:40Z Server-Side Request Forgery GET /blog/apt10 ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
229 2026-05-07T15:11:13Z SQL Injection GET /blog/salt-typhoon sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
230 2026-05-07T16:59:49Z SQL Injection GET /blog/mustang-panda sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
231 2026-05-07T17:06:25Z SQL Injection GET /blog/salt-typhoon sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
232 2026-05-08T04:57:27Z SQL Injection GET /blog/what-is-spear-phishing sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
233 2026-05-08T13:35:16Z SQL Injection GET /blog/what-is-spear-phishing sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
234 2026-05-08T16:39:14Z Server-Side Request Forgery GET /blog/airspace-penetration-testing ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
235 2026-05-08T16:43:23Z SQL Injection GET /blog/airspace-penetration-testing sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
236 2026-05-08T18:46:41Z SQL Injection GET /blog/wifi-penetration-testing-of-companies sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
237 2026-05-09T05:01:11Z Server-Side Request Forgery GET /blog/wifi-penetration-testing-of-companies ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
238 2026-05-09T07:45:41Z Server-Side Request Forgery GET /blog/what-is-spear-phishing ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
239 2026-05-09T15:06:15Z Server-Side Request Forgery GET /blog/what-is-spear-phishing ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
240 2026-05-09T15:07:27Z Server-Side Request Forgery GET /blog/what-is-spear-phishing ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
241 2026-05-09T19:13:17Z Server-Side Request Forgery GET /blog/wifi-penetration-testing-of-companies ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
242 2026-05-09T20:42:00Z SQL Injection GET /blog/wifi-penetration-testing-of-companies sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
243 2026-05-10T16:07:33Z Server-Side Request Forgery GET /blog/apt3 ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
244 2026-05-10T17:29:22Z Server-Side Request Forgery GET /blog/volt-typhoon ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
245 2026-05-11T02:33:26Z SQL Injection GET /blog/apt27 sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
246 2026-05-11T06:37:10Z Server-Side Request Forgery GET /blog/apt27 ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
247 2026-05-11T12:14:32Z Server-Side Request Forgery GET /blog/apt27 ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
248 2026-05-11T14:51:28Z Server-Side Request Forgery GET /blog/apt35 ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
249 2026-05-11T20:41:42Z SQL Injection GET /blog/apt39-a-closer-look sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
250 2026-05-12T03:44:25Z Server-Side Request Forgery GET /blog/what-is-spear-phishing ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
251 2026-05-12T03:47:25Z SQL Injection GET /blog/what-is-spear-phishing sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
252 2026-05-12T03:48:40Z SQL Injection GET /blog/what-is-spear-phishing sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
253 2026-05-12T15:59:13Z SQL Injection GET /blog/what-is-hipaa sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
254 2026-05-12T17:24:36Z SQL Injection GET /blog/what-is-hipaa sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
255 2026-05-12T18:12:33Z Server-Side Request Forgery GET /blog/wifi-penetration-testing-of-companies ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
256 2026-05-12T18:57:18Z SQL Injection GET /blog/metasploit-deep-dive-exploitation-framework sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
257 2026-05-13T03:27:12Z Server-Side Request Forgery GET /blog/volt-typhoon ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
258 2026-05-14T17:10:11Z SQL Injection GET /blog/airspace-penetration-testing sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
259 2026-05-14T18:33:09Z Server-Side Request Forgery GET /blog/from-the-hacker-desk-vlan-not-segmented ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
260 2026-05-15T02:25:07Z SQL Injection GET /blog/wifi-penetration-testing-of-companies sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
261 2026-05-15T14:53:30Z Server-Side Request Forgery GET /blog/wifi-penetration-testing-of-companies ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
262 2026-05-15T15:04:48Z SQL Injection GET /blog/wifi-penetration-testing-of-companies sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
263 2026-05-15T15:56:19Z SQL Injection GET /blog/apt15 sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
264 2026-05-15T15:56:19Z Server-Side Request Forgery GET /blog/apt27 ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
265 2026-05-15T16:03:16Z Server-Side Request Forgery GET /blog/apt15 ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
266 2026-05-15T16:03:16Z SQL Injection GET /blog/apt27 sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
267 2026-05-15T18:40:07Z SQL Injection GET /blog/apt10 sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
268 2026-05-16T05:09:09Z Server-Side Request Forgery GET /blog/salt-typhoon ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i

In Summary

You came. You saw. You got absolutely owned by a hedgehog.

Every request you made was detected, logged, and laughed at. Our WAF didn't even break a sweat. Maybe next time try something more challenging — like reading a book on operational security.

Pro tip: If you're going to hack a cybersecurity company, maybe don't use the same IP address for every single request. Just a thought.