Congratulations,
Dumbass

> cat /var/log/your-failures.log_

A very special round of applause for 217.113.194.251 for their valiant — and entirely unsuccessful — attempt to compromise our systems. We truly couldn't have done it without you. Well, actually we could. We did. You failed.

We Might Not Know Where You Live, But...

Did you think you were anonymous? That's adorable. Here's what we know about you:

IP Address 217.113.194.251
Country France
Region Unknown
City Unknown
ISP / Org Unknown
Timezone Unknown
Coordinates 48.8582, 2.3387

Your Digital Fingerprint

Nice browser you've got there. It'd be a shame if someone… logged it.

Mozilla/5.0 (compatible; Barkrowler/0.9; +https://babbar.tech/crawler)

Your Hall of Shame

Every single one of your pathetic attempts, lovingly preserved for posterity. Spoiler alert: they all failed.

Attack Breakdown

16
SQL Injection
16
Total Failed Attempts

Detailed Activity Log

# Timestamp Attack Type Method Target URI Detail
1 2026-02-19T08:05:47Z SQL Injection GET /blog/cve-2024-45519 sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
2 2026-02-19T08:13:48Z SQL Injection GET /services/security-operations-centre/detect sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
3 2026-02-19T08:39:50Z SQL Injection GET /blog/apt24-the-strategic-spy sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
4 2026-02-24T17:17:16Z SQL Injection GET /services/siem sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
5 2026-02-24T17:47:17Z SQL Injection GET /blog/what-is-threat-detection sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
6 2026-03-02T03:10:51Z SQL Injection GET /blog/weekly-cybersecurity-roundup---lots-of-cyberattacks sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
7 2026-03-23T10:49:58Z SQL Injection GET /blog/grizzly-steppe sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
8 2026-03-23T10:55:58Z SQL Injection GET /?ref=palisade.email sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
9 2026-03-23T11:09:58Z SQL Injection GET /blog/ai-augmented-phishing-guidance sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
10 2026-03-23T11:15:58Z SQL Injection GET /blog/apt3-the-sophisticated-exploiter sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
11 2026-03-28T13:14:16Z SQL Injection GET /industries/maritime sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
12 2026-03-28T14:54:20Z SQL Injection GET /blog/the-future-of-cyber-defense-trends-to-watch-in-2024-and-beyond sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
13 2026-04-07T15:27:15Z SQL Injection GET /customers/cel sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
14 2026-04-12T15:42:13Z SQL Injection GET /blog/a-guide-to-attack-surface-analysis sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
15 2026-05-03T10:20:42Z SQL Injection GET /virtual-ciso sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//
16 2026-05-03T10:28:27Z SQL Injection GET /firefox-users-should-update-immediately sqli [HEADER][HTTP_ACCEPT] matched /\/\*[\s\S]*?\*\//

In Summary

You came. You saw. You got absolutely owned by a hedgehog.

Every request you made was detected, logged, and laughed at. Our WAF didn't even break a sweat. Maybe next time try something more challenging — like reading a book on operational security.

Pro tip: If you're going to hack a cybersecurity company, maybe don't use the same IP address for every single request. Just a thought.