Anonymous
2024-08-23 23:14:05
(3 weeks ago)
wordpress-trap
Web App Attack
Anonymous
2024-08-23 20:02:18
(3 weeks ago)
wordpress-trap
Web App Attack
TPI-Abuse
2024-08-21 19:56:24
(3 weeks ago)
(mod_security) mod_security (id:210492) triggered by 103.163.220.167 (-): 1 in the last 300 secs; Po ... show more (mod_security) mod_security (id:210492) triggered by 103.163.220.167 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Wed Aug 21 15:56:16.748001 2024] [security2:error] [pid 12503:tid 12503] [client 103.163.220.167:14453] [client 103.163.220.167] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "wp-config.php" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "spiritofacorn.com"] [uri "/wp-config.php"] [unique_id "ZsZGYMuD_T_Zd-NEPxRzSgAAAAA"] show less
Brute-Force
Bad Web Bot
Web App Attack
Christopher Hughes
2024-08-19 20:49:36
(3 weeks ago)
[Mon Aug 19 21:49:34.728194 2024] [proxy_fcgi:error] [pid 3116686:tid 139916311713344] [client 103.1 ... show more [Mon Aug 19 21:49:34.728194 2024] [proxy_fcgi:error] [pid 3116686:tid 139916311713344] [client 103.163.220.167:30519] AH01071: Got error 'Primary script unknown'
[Mon Aug 19 21:49:35.147242 2024] [proxy_fcgi:error] [pid 3116686:tid 139916320106048] [client 103.163.220.167:30519] AH01071: Got error 'Primary script unknown'
[Mon Aug 19 21:49:35.562152 2024] [proxy_fcgi:error] [pid 3116686:tid 139915530593856] [client 103.163.220.167:30519] AH01071: Got error 'Primary script unknown'
[Mon Aug 19 21:49:35.998489 2024] [proxy_fcgi:error] [pid 3116686:tid 139915538986560] [client 103.163.220.167:30519] AH01071: Got error 'Primary script unknown'
[Mon Aug 19 21:49:36.471003 2024] [proxy_fcgi:error] [pid 3116686:tid 139915119547968] [client 103.163.220.167:30519] AH01071: Got error 'Primary script unknown'
... show less
Web App Attack
TPI-Abuse
2024-08-03 20:10:45
(1 month ago)
(mod_security) mod_security (id:225170) triggered by 103.163.220.167 (-): 1 in the last 300 secs; Po ... show more (mod_security) mod_security (id:225170) triggered by 103.163.220.167 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Aug 03 16:10:41.776328 2024] [security2:error] [pid 31874:tid 31874] [client 103.163.220.167:28335] [client 103.163.220.167] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.unladenswallow.us|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.unladenswallow.us"] [uri "/wp-json/wp/v2/users/"] [unique_id "Zq6Owda0SktZNFzcM7_dNgAAAAw"] show less
Brute-Force
Bad Web Bot
Web App Attack
Linuxmalwarehuntingnl
2024-07-01 10:51:22
(2 months ago)
Unauthorized connection attempt
Brute-Force
vestibtech
2024-06-29 21:09:44
(2 months ago)
103.163.220.167 - - [29/Jun/2024:15:09:44 -0600] "GET /blog/wp-admin/includes/about.php HTTP/1.1" 30 ... show more 103.163.220.167 - - [29/Jun/2024:15:09:44 -0600] "GET /blog/wp-admin/includes/about.php HTTP/1.1" 301 485 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0"
... show less
Web App Attack
cmbplf
2024-06-26 14:31:27
(2 months ago)
245 requests to */.well-known/pki-validation/*.php
Brute-Force
Bad Web Bot
TPI-Abuse
2024-06-25 06:16:37
(2 months ago)
(mod_security) mod_security (id:210492) triggered by 103.163.220.167 (-): 1 in the last 300 secs; Po ... show more (mod_security) mod_security (id:210492) triggered by 103.163.220.167 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Jun 25 02:16:34.033374 2024] [security2:error] [pid 21731] [client 103.163.220.167:30671] [client 103.163.220.167] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "wp-config.php" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "gilgoinn.com"] [uri "/wp-config.php"] [unique_id "ZnpgwvA3C2e7Yx89DNnU6gAAAAc"] show less
Brute-Force
Bad Web Bot
Web App Attack
zynex
2024-06-11 01:25:34
(3 months ago)
URL Probing: /uc.php
Web App Attack
vestibtech
2024-06-10 14:01:22
(3 months ago)
103.163.220.167 - - [10/Jun/2024:08:01:21 -0600] "GET /wordpress/ HTTP/1.1" 301 437 "-" "Mozilla/5.0 ... show more 103.163.220.167 - - [10/Jun/2024:08:01:21 -0600] "GET /wordpress/ HTTP/1.1" 301 437 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36"
... show less
Web App Attack
sid3windr
2024-06-04 03:48:44
(3 months ago)
GET /.env (Tarpitted for 2h21m4s, wasted 495.94kB)
Web App Attack
sid3windr
2024-06-04 03:04:14
(3 months ago)
GET /.env (Tarpitted for 32m28s, wasted 114.26kB)
Web App Attack
TPI-Abuse
2024-05-29 10:29:25
(3 months ago)
(mod_security) mod_security (id:210730) triggered by 103.163.220.167 (-): 1 in the last 300 secs; Po ... show more (mod_security) mod_security (id:210730) triggered by 103.163.220.167 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Wed May 29 06:29:20.508851 2024] [security2:error] [pid 5550] [client 103.163.220.167:25169] [client 103.163.220.167] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||halsieling.com|F|2"] [data ".php.bak"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "halsieling.com"] [uri "/site/default/settings.php.BAK"] [unique_id "ZlcDgLVEmSgsA7d4j6lvpwAAAAg"] show less
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
2024-05-27 04:14:00
(3 months ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH