Congratulations,
Dumbass

> cat /var/log/your-failures.log_

A very special round of applause for 217.113.194.183 for their valiant — and entirely unsuccessful — attempt to compromise our systems. We truly couldn't have done it without you. Well, actually we could. We did. You failed.

We Might Not Know Where You Live, But...

Did you think you were anonymous? That's adorable. Here's what we know about you:

IP Address 217.113.194.183
Country France
Region Unknown
City Unknown
ISP / Org Unknown
Timezone Unknown
Coordinates 48.8582, 2.3387

Your Digital Fingerprint

Nice browser you've got there. It'd be a shame if someone… logged it.

Mozilla/5.0 (compatible; Barkrowler/0.9; +https://babbar.tech/crawler)

Your Hall of Shame

Every single one of your pathetic attempts, lovingly preserved for posterity. Spoiler alert: they all failed.

Attack Breakdown

18
SQL Injection
18
Total Failed Attempts

Detailed Activity Log

# Timestamp Attack Type Method Target URI Detail
1 2026-02-13T21:30:39Z SQL Injection GET /blog/ai-augmented-phishing-guidance sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
2 2026-02-13T21:42:46Z SQL Injection GET /services/security-operations-centre/disrupt sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
3 2026-02-19T07:59:47Z SQL Injection GET /blog/cve-2024-21410 sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
4 2026-02-19T08:19:49Z SQL Injection GET /blog/apt15-the-strategic-operator sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
5 2026-02-19T08:59:54Z SQL Injection GET /blog/teamviewer-hack---what-you-need-to-know sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
6 2026-02-19T09:01:54Z SQL Injection GET /blog/apt12-the-prcs-cyber-operative sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
7 2026-02-19T10:00:00Z SQL Injection GET /blog/the-top-cyber-threats-of-2024-what-your-business-needs-to-know sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
8 2026-02-19T10:08:00Z SQL Injection GET /blog/fortinet-cybersecurity-the-latest-cve-vulnerability-you-need-to-know sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
9 2026-02-24T17:59:19Z SQL Injection GET /blog/apt6-the-industry-competitor sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
10 2026-02-24T18:39:21Z SQL Injection GET /blog/critical-sonicwall-firewall-vulnerability-patch-now-to-secure-your-network?ref=thetechedge.ai sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
11 2026-03-02T01:08:43Z SQL Injection GET /industries/legal sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
12 2026-03-02T01:22:43Z SQL Injection GET /blog/over-the-air-breach sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
13 2026-03-02T01:44:44Z SQL Injection GET /services/security-operations-centre/defend sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
14 2026-03-02T02:44:49Z SQL Injection GET /blog/apt27-the-intellectual-property-thief sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
15 2026-03-07T21:17:54Z SQL Injection GET /industries/education sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
16 2026-03-07T21:35:55Z SQL Injection GET /blog/what-are-tarpits sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
17 2026-03-07T21:53:55Z SQL Injection GET /blog/ai-augmented-phishing-guidance sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
18 2026-03-07T22:15:56Z SQL Injection GET /blog/cybersecurity-news-june-1-7-2024 sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//

In Summary

You came. You saw. You got absolutely owned by a hedgehog.

Every request you made was detected, logged, and laughed at. Our WAF didn't even break a sweat. Maybe next time try something more challenging — like reading a book on operational security.

Pro tip: If you're going to hack a cybersecurity company, maybe don't use the same IP address for every single request. Just a thought.