Anonymous
2024-11-12 10:44:15
(2 weeks ago)
Web Spam
Anonymous
2024-11-12 09:57:35
(2 weeks ago)
PSCDE WEBFORM SPAM 104.168.133.218 (client-104-168-133-218.hostwindsdns.com)
Web Spam
el-brujo
2024-11-12 09:20:17
(2 weeks ago)
12/Nov/2024:10:20:17.242994 +0100Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client ... show more 12/Nov/2024:10:20:17.242994 +0100Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client 104.168.133.218] ModSecurity: Rule 55aca4e608a8 [id "932110"][file "/etc/httpd/modsecurity.d/activated_rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf"][line "256"] - Execution error - PCRE limits exceeded (-8): (null). [hostname "www.hostench.eu"] [uri "/wp-json/contact-form-7/v1/contact-forms/296/feedback"] [unique_id "ZzMd0Wg9FBW5AHopnViSpAABUxU"]
... show less
Hacking
Web App Attack
Anonymous
2024-11-12 08:06:47
(2 weeks ago)
SPROVFR WEBFORM SPAM 104.168.133.218 (client-104-168-133-218.hostwindsdns.com)
Web Spam
Anonymous
2024-11-12 06:49:14
(2 weeks ago)
Form submission spam detected
Web Spam
backslash
2024-11-12 04:05:03
(2 weeks ago)
Web Spam
Peter Chargen
2024-11-12 03:24:42
(2 weeks ago)
PHP email form abuse/SPAM attempt
Email Spam
getaccessibleapps.com
2024-11-12 02:25:33
(2 weeks ago)
Web Spam
TPI-Abuse
2024-11-11 23:24:50
(2 weeks ago)
(mod_security) mod_security (id:217280) triggered by 104.168.133.218 (client-104-168-133-218.hostwin ... show more (mod_security) mod_security (id:217280) triggered by 104.168.133.218 (client-104-168-133-218.hostwindsdns.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Nov 11 18:24:45.203922 2024] [security2:error] [pid 28608:tid 28608] [client 104.168.133.218:50199] [client 104.168.133.218] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\n|\\\\r)+(?:get|post|head|options|connect|put|delete|trace|propfind|propatch|mkcol|copy|move|lock|unlock)\\\\s+" at MATCHED_VAR. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/12_HTTP_Protocol.conf"] [line "137"] [id "217280"] [rev "6"] [msg "COMODO WAF: HTTP Request Smuggling Attack||www.goopyboo.com|F|2"] [data "Matched Data: connect found within MATCHED_VAR"] [severity "CRITICAL"] [tag "CWAF"] [tag "Protocol"] [hostname "www.goopyboo.com"] [uri "/contactus.html"] [unique_id "ZzKSPRL9BekOETIawwWL0gAAAAU"], referer: https://www.goopyboo.com/contactus.html show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-11-11 18:50:25
(3 weeks ago)
(mod_security) mod_security (id:217280) triggered by 104.168.133.218 (client-104-168-133-218.hostwin ... show more (mod_security) mod_security (id:217280) triggered by 104.168.133.218 (client-104-168-133-218.hostwindsdns.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Nov 11 13:50:17.930978 2024] [security2:error] [pid 32665:tid 32691] [client 104.168.133.218:60553] [client 104.168.133.218] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\n|\\\\r)+(?:get|post|head|options|connect|put|delete|trace|propfind|propatch|mkcol|copy|move|lock|unlock)\\\\s+" at MATCHED_VAR. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/12_HTTP_Protocol.conf"] [line "137"] [id "217280"] [rev "6"] [msg "COMODO WAF: HTTP Request Smuggling Attack||www.howlerrock.com|F|2"] [data "Matched Data: connect found within MATCHED_VAR"] [severity "CRITICAL"] [tag "CWAF"] [tag "Protocol"] [hostname "www.howlerrock.com"] [uri "/contact/"] [unique_id "ZzJR6UCPvsI0QPO8kivHvQAAAFc"], referer: https://www.howlerrock.com/contact/ show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-11-11 17:22:50
(3 weeks ago)
(mod_security) mod_security (id:217280) triggered by 104.168.133.218 (client-104-168-133-218.hostwin ... show more (mod_security) mod_security (id:217280) triggered by 104.168.133.218 (client-104-168-133-218.hostwindsdns.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Nov 11 12:22:44.353361 2024] [security2:error] [pid 20214:tid 20214] [client 104.168.133.218:60277] [client 104.168.133.218] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\n|\\\\r)+(?:get|post|head|options|connect|put|delete|trace|propfind|propatch|mkcol|copy|move|lock|unlock)\\\\s+" at MATCHED_VAR. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/12_HTTP_Protocol.conf"] [line "137"] [id "217280"] [rev "6"] [msg "COMODO WAF: HTTP Request Smuggling Attack||aurumprivatecapital.com|F|2"] [data "Matched Data: connect found within MATCHED_VAR"] [severity "CRITICAL"] [tag "CWAF"] [tag "Protocol"] [hostname "aurumprivatecapital.com"] [uri "/contact.html"] [unique_id "ZzI9ZG5SDms0DVn2vRVQGQAAAAk"], referer: http://aurumprivatecapital.com/contact.html show less
Brute-Force
Bad Web Bot
Web App Attack
maximonline.co.za
2024-11-11 15:17:03
(3 weeks ago)
Contact form spam.
Web Spam
oncord
2024-11-11 14:11:00
(3 weeks ago)
Form spam
Web Spam
nowyouknow
2024-11-11 13:47:24
(3 weeks ago)
(From [email protected] ) Hi,
Presently, this service-based system has b ... show more (From [email protected] ) Hi,
Presently, this service-based system has been pulling over $28,000 in 10 months for one of our freelancers…
We have finally cracked and replicated this system in our new software so that even a novice can earn top dollars online without experience.
That’s why we launched FreelancerPro AI,
>> See how it works here and get instant access: https://www.moredollar.info/freelancerproai
FreelancerPro AI comes with an automated and ready-to-profit freelancing system… Just set and forget while AI makes the profit for you.
It takes just 60 seconds to set up…
Imagine getting access to software that helps you profit from the $3.5M freelancing industry without a huge investment.
Unlike Fiverr and Upwork where you have to bid for jobs;
You aren’t doing any of that, AI lands these high-paying jobs and executes them for you while you get paid instantly into your local bank account.
This is a no-brainer if you are looking for the easiest way to make mo show less
Phishing
Web Spam