Server vulnerable to Log4J CVE-2021-44228. The reply originated from a backend server, the originating frontend server has been included in the report for reference.
It is critical to patch log4j or the application using since the issues is exploited in the wild and leads to RCE.
Received reply after a Log4j payload from this host
Ping was received because of query argument
Reply took 6.336681316s
Orignal request was to 194.78.26.207:8888
This event's HTTP and SSL details are preserved from the orignal request.
Orignal reply:
5265636569766564207265706c792061667465722061204c6f67346a207061796c6f61642066726f6d207468697320686f73740a50696e67207761732072656365697665642062656361757365206f6620717565727920617267756d656e740a5265706c7920746f6f6b20362e333336363831333136730a4f7269676e616c20726571756573742077617320746f203139342e37382e32362e3230373a383838380a54686973206576656e742773204854545020616e642053534c2064657461696c7320617265207072657365727665642066726f6d20746865206f7269676e616c20726571756573742e0a