Congratulations,
Dumbass

> cat /var/log/your-failures.log_

A very special round of applause for 213.174.148.161 for their valiant — and entirely unsuccessful — attempt to compromise our systems. We truly couldn't have done it without you. Well, actually we could. We did. You failed.

We Might Not Know Where You Live, But...

Did you think you were anonymous? That's adorable. Here's what we know about you:

IP Address 213.174.148.161
Country The Netherlands
Region Unknown
City Unknown
ISP / Org Unknown
Timezone Unknown
Coordinates 52.3824, 4.8995

Your Digital Fingerprint

Nice browser you've got there. It'd be a shame if someone… logged it.

Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:121.0) Gecko/20100101 Firefox/121.0

Your Hall of Shame

Every single one of your pathetic attempts, lovingly preserved for posterity. Spoiler alert: they all failed.

Attack Breakdown

7
SQL Injection
8
Server-Side Request Forgery
15
Total Failed Attempts

Detailed Activity Log

# Timestamp Attack Type Method Target URI Detail
1 2026-02-13T10:37:30Z SQL Injection GET /industries/engineering sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
2 2026-02-13T10:37:30Z Server-Side Request Forgery GET /industries/legal ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
3 2026-02-23T02:54:21Z Server-Side Request Forgery GET /blog/the-role-of-ai-in-modern-cyber-defense-enhancing-security-with-machine-learning ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
4 2026-02-27T10:35:01Z Server-Side Request Forgery GET /services/security-operations-centre/detect ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
5 2026-02-27T10:55:51Z SQL Injection GET /services/security-operations-centre/detect sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
6 2026-03-07T05:42:29Z Server-Side Request Forgery GET /blog/evidence-screenshots-and-reproduction-steps ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
7 2026-03-11T07:40:36Z SQL Injection GET /industries/transportation-and-logistics sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
8 2026-03-11T07:40:36Z Server-Side Request Forgery GET /industries/healthcare ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
9 2026-03-11T07:40:36Z SQL Injection GET /industries/energy-and-utilites sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
10 2026-03-11T07:40:36Z Server-Side Request Forgery GET /industries/financial-services ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
11 2026-03-11T07:40:36Z Server-Side Request Forgery GET /services/security-operations-centre/detect ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
12 2026-03-12T15:52:26Z SQL Injection GET /services/security-operations-centre/detect sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
13 2026-03-18T17:40:02Z Server-Side Request Forgery GET /services/security-operations-centre/detect ssrf [HEADER][HTTP_USER_AGENT] matched /(?:127\.0\.0\.[01]|0\.0\.0\.0|localhost|::1|\[::1\])/i
14 2026-03-20T14:41:13Z SQL Injection GET /services/security-operations-centre/detect sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
15 2026-03-20T16:00:34Z SQL Injection GET /services/security-operations-centre/detect sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//

In Summary

You came. You saw. You got absolutely owned by a hedgehog.

Every request you made was detected, logged, and laughed at. Our WAF didn't even break a sweat. Maybe next time try something more challenging — like reading a book on operational security.

Pro tip: If you're going to hack a cybersecurity company, maybe don't use the same IP address for every single request. Just a thought.