This Week Is Round: 381
NickName: J33R4FF3
Created at: 2018-01-25 05:54:22.485322
Expiry at: 2018-03-24 05:54:22
Country: ZA
City/Town: Pretoria
Phone Number Valid: NO
IDS Alerts: 190
Total # Of Rounds Allowed: 13
Total # Of Rounds Played: 3
Rounds Played: #330 #331 #333
Minutes Online: 445 (7 hours)
Total Traffic Transfered: 677479241 bytes
Points: 4 of a maximum of 35
Points per Minute: 0.0090
Points per Hour: 0.5393

The following graph shows the game as it was when the user was playing
If hosts have been added or removed since the player expired these will not be shown

%3 cluster_a cluster_0 DMZ cluster_1 Desktop cluster_2 SCADA cluster_3 Key DMZ_Apache_FTP_Debian DMZ_Apache_FTP_Debian DMZ_Apache_Win2k3 DMZ_Apache_Win2k3 DMZ_Corpweb_Debian DMZ_Corpweb_Debian DMZ_Lime_Debian DMZ_Lime_Debian DMZ_Mail_Debian DMZ_Mail_Debian DMZ_ns1 DMZ_ns1 DMZ_RAS DMZ_RAS DMZ_Shop DMZ_Shop DMZ_VideoConf_TB DMZ_VideoConf_TB DMZ_www1_Debian DMZ_www1_Debian Desktop_AD_2k8 Desktop_AD_2k8 Desktop_Apache_Debian Desktop_Apache_Debian Desktop_Cacti_Debian Desktop_Cacti_Debian Desktop_Cisco1 Desktop_Cisco1 Desktop_Cisco2 Desktop_Cisco2 Desktop_Cisco3 Desktop_Cisco3 Desktop_Exchange Desktop_Exchange Desktop_FileServer Desktop_FileServer Desktop_HRDesktop_araju_WinXPSP2 Desktop_HRDesktop_araju_WinXPSP2 Desktop_ITDesktop_rforbes Desktop_ITDesktop_rforbes Desktop_MYSQL1_Debian Desktop_MYSQL1_Debian Desktop_MYSQL2_Debian Desktop_MYSQL2_Debian Desktop_Sharepoint Desktop_Sharepoint Desktop_UbuntuAdmin_Ubuntu Desktop_UbuntuAdmin_Ubuntu Desktop_VMS1 Desktop_VMS1 Desktop_Win7 Desktop_Win7 SCADACON_Reactor_Control SCADACON_Reactor_Control SCADACON_Win2k SCADACON_Win2k SCADA_Desktop_WINXP SCADA_Desktop_WINXP SCADA_IGSS_XP SCADA_IGSS_XP SCADA_Water SCADA_Water POINT 0wn3d NOPOINT Not0wn3d


The last 50 IDS alarms for J33R4FF3

DATE HOST Event
2018-01-31 08:17:50.998J33R4FF3OS-OTHER Bash CGI environment variable injection attempt
- J33R4FF3 Previous message repeated 8 times
2018-01-26 08:41:05.009J33R4FF3SQL generic sql with comments injection attempt - GET parameter
- J33R4FF3 Previous message repeated 2 times
2018-01-26 08:37:32.97J33R4FF3SERVER-WEBAPP JBoss web console access attempt
2018-01-26 08:36:24.582J33R4FF3OS-OTHER Bash CGI environment variable injection attempt