ManagedStack
2024-12-12 11:53:32
(1 month ago)
Wordpress Attack
Web App Attack
TPI-Abuse
2024-11-05 05:04:44
(2 months ago)
(mod_security) mod_security (id:225170) triggered by 102.218.50.254 (-): 1 in the last 300 secs; Por ... show more (mod_security) mod_security (id:225170) triggered by 102.218.50.254 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Nov 05 00:04:36.241123 2024] [security2:error] [pid 665:tid 665] [client 102.218.50.254:6402] [client 102.218.50.254] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||grabagame.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "grabagame.com"] [uri "/wp-json/wp/v2/users/1"] [unique_id "ZymnZOgxJag9SIshiA8vZQAAAAg"] show less
Brute-Force
Bad Web Bot
Web App Attack
Hobby Bob
2024-06-14 11:09:14
(6 months ago)
Jun 14 12:09:14 mail postfix/smtpd[3195058]: NOQUEUE: reject: RCPT from unknown[102.218.50.254]: 554 ... show more Jun 14 12:09:14 mail postfix/smtpd[3195058]: NOQUEUE: reject: RCPT from unknown[102.218.50.254]: 554 5.7.1 Service unavailable; Client host [102.218.50.254] blocked using zen.spamhaus.org; Listed by CSS, see https://check.spamhaus.org/query/ip/102.218.50.254 / Listed by XBL, see https://check.spamhaus.org/query/ip/102.218.50.254; from= to= proto=ESMTP helo= show less
Email Spam
Email Spam
axllent
2024-06-09 11:24:25
(7 months ago)
Wordpress login scanning
Brute-Force
Web App Attack
TPI-Abuse
2024-05-13 07:32:34
(8 months ago)
(mod_security) mod_security (id:225170) triggered by 102.218.50.254 (-): 1 in the last 300 secs; Por ... show more (mod_security) mod_security (id:225170) triggered by 102.218.50.254 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon May 13 03:32:28.440982 2024] [security2:error] [pid 9178] [client 102.218.50.254:58220] [client 102.218.50.254] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||chickiesbeef.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "chickiesbeef.com"] [uri "/wp-json/wp/v2/users/1"] [unique_id "ZkHCDAJ-ti63ywPWNXL2XQAAAAg"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-05-11 09:38:09
(8 months ago)
(mod_security) mod_security (id:225170) triggered by 102.218.50.254 (-): 1 in the last 300 secs; Por ... show more (mod_security) mod_security (id:225170) triggered by 102.218.50.254 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat May 11 05:38:03.592038 2024] [security2:error] [pid 25408] [client 102.218.50.254:54508] [client 102.218.50.254] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.quickasawink.org|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.quickasawink.org"] [uri "/wp-json/wp/v2/users/1"] [unique_id "Zj88e86HCCTqoqD1kqzWXwAAAAY"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-04-27 09:39:46
(8 months ago)
(mod_security) mod_security (id:225170) triggered by 102.218.50.254 (-): 1 in the last 300 secs; Por ... show more (mod_security) mod_security (id:225170) triggered by 102.218.50.254 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Apr 27 05:39:41.590306 2024] [security2:error] [pid 12137] [client 102.218.50.254:39750] [client 102.218.50.254] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||persnicketyinc.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "persnicketyinc.com"] [uri "/wp-json/wp/v2/users/1"] [unique_id "ZizH3fUiMcAIzW34NCl0TwAAAAE"] show less
Brute-Force
Bad Web Bot
Web App Attack
Hirte
2024-04-23 05:48:10
(8 months ago)
HHV: Web Attack GET /wp-login.php
Web Spam
Hacking
Bad Web Bot
Web App Attack
SilverZippo
2023-12-22 15:31:30
(1 year ago)
Web App Attack
Web App Attack
Anonymous
2023-12-10 02:10:00
(1 year ago)
"Illegal file type"
Brute-Force
URAN Publishing Service
2023-12-04 14:48:53
(1 year ago)
102.218.50.254 - - [04/Dec/2023:16:48:49 +0200] "GET /wp-login.php HTTP/1.1" 404 4781 "-" "Mozilla/5 ... show more 102.218.50.254 - - [04/Dec/2023:16:48:49 +0200] "GET /wp-login.php HTTP/1.1" 404 4781 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
102.218.50.254 - - [04/Dec/2023:16:48:51 +0200] "GET /xmlrpc.php HTTP/1.1" 404 366 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
... show less
Web App Attack
MAGIC
2023-11-27 14:00:16
(1 year ago)
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot
ph
2023-11-25 10:48:01
(1 year ago)
Bad web bot attempting to run wp-login.php on non-WP site
Hacking
Bad Web Bot
Web App Attack
TPI-Abuse
2023-11-18 09:52:57
(1 year ago)
(mod_security) mod_security (id:225170) triggered by 102.218.50.254 (-): 1 in the last 300 secs; Por ... show more (mod_security) mod_security (id:225170) triggered by 102.218.50.254 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 18 04:52:52.284927 2023] [security2:error] [pid 20620] [client 102.218.50.254:18905] [client 102.218.50.254] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||grabagame.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "grabagame.com"] [uri "/wp-json/wp/v2/users/1"] [unique_id "ZViJdOOdvWn-3rPuZz2HagAAAAk"] show less
Brute-Force
Bad Web Bot
Web App Attack
MAGIC
2023-11-10 20:05:30
(1 year ago)
VM5 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot