dromotique.com
2024-04-04 19:50:29
(6 months ago)
agent=Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0. ... show more agent=Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1264.71
message=Hi dromotique.com,
Do you know?
There are more than 400 Million registered small businesses across the globe…
But,
Here’s the shocking part…
More than 84% of these business owners rate sending targeted emails that land in their inbox for ultimately c... show less
Email Spam
ISPLtd
2024-03-19 14:00:18
(6 months ago)
104.168.144.252 - - [19/Mar/2024:11:01:49 -0300] "GET /xmlrpc.php?rsd
104.168.144.252 - - [19/ ... show more 104.168.144.252 - - [19/Mar/2024:11:01:49 -0300] "GET /xmlrpc.php?rsd
104.168.144.252 - - [19/Mar/2024:11:01:50 -0300] "GET /xmlrpc.php
... show less
Hacking
Web App Attack
maximonline.co.za
2024-03-19 10:47:05
(6 months ago)
Contact form spam.
Web Spam
TPI-Abuse
2024-03-19 10:34:34
(6 months ago)
(mod_security) mod_security (id:217280) triggered by 104.168.144.252 (client-104-168-144-252.hostwin ... show more (mod_security) mod_security (id:217280) triggered by 104.168.144.252 (client-104-168-144-252.hostwindsdns.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Mar 19 06:34:28.534255 2024] [security2:error] [pid 11414] [client 104.168.144.252:59560] [client 104.168.144.252] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\n|\\\\r)+(?:get|post|head|options|connect|put|delete|trace|propfind|propatch|mkcol|copy|move|lock|unlock)\\\\s+" at MATCHED_VAR. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/12_HTTP_Protocol.conf"] [line "137"] [id "217280"] [rev "6"] [msg "COMODO WAF: HTTP Request Smuggling Attack||dibaplac.com|F|2"] [data "Matched Data: get found within MATCHED_VAR"] [severity "CRITICAL"] [tag "CWAF"] [tag "Protocol"] [hostname "dibaplac.com"] [uri "/index-4.html"] [unique_id "ZflqNKvNnDRfPaQmtntl7wAAABM"], referer: https://dibaplac.com/index-4.html show less
Brute-Force
Bad Web Bot
Web App Attack
Futunk
2024-03-19 09:14:54
(6 months ago)
Form spam (honeypot): POST /contact
Web Spam
TPI-Abuse
2024-03-19 09:07:20
(6 months ago)
(mod_security) mod_security (id:217280) triggered by 104.168.144.252 (client-104-168-144-252.hostwin ... show more (mod_security) mod_security (id:217280) triggered by 104.168.144.252 (client-104-168-144-252.hostwindsdns.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Mar 19 05:07:15.819097 2024] [security2:error] [pid 26971] [client 104.168.144.252:63754] [client 104.168.144.252] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\n|\\\\r)+(?:get|post|head|options|connect|put|delete|trace|propfind|propatch|mkcol|copy|move|lock|unlock)\\\\s+" at MATCHED_VAR. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/12_HTTP_Protocol.conf"] [line "137"] [id "217280"] [rev "6"] [msg "COMODO WAF: HTTP Request Smuggling Attack||johnprimerano.com|F|2"] [data "Matched Data: get found within MATCHED_VAR"] [severity "CRITICAL"] [tag "CWAF"] [tag "Protocol"] [hostname "johnprimerano.com"] [uri "/contact.html"] [unique_id "ZflVw2G0eoZ1rgjzCuV-hgAAABc"], referer: http://johnprimerano.com/contact.html show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-03-19 07:23:56
(6 months ago)
(mod_security) mod_security (id:217280) triggered by 104.168.144.252 (client-104-168-144-252.hostwin ... show more (mod_security) mod_security (id:217280) triggered by 104.168.144.252 (client-104-168-144-252.hostwindsdns.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Mar 19 03:23:50.951301 2024] [security2:error] [pid 14526] [client 104.168.144.252:63342] [client 104.168.144.252] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\n|\\\\r)+(?:get|post|head|options|connect|put|delete|trace|propfind|propatch|mkcol|copy|move|lock|unlock)\\\\s+" at MATCHED_VAR. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/12_HTTP_Protocol.conf"] [line "137"] [id "217280"] [rev "6"] [msg "COMODO WAF: HTTP Request Smuggling Attack||jamesallenwalker.com|F|2"] [data "Matched Data: get found within MATCHED_VAR"] [severity "CRITICAL"] [tag "CWAF"] [tag "Protocol"] [hostname "jamesallenwalker.com"] [uri "/contact.html"] [unique_id "Zfk9hs_utdpHSWMjTXF5mgAAAAU"], referer: http://jamesallenwalker.com/contact.html show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-03-19 06:58:54
(6 months ago)
(mod_security) mod_security (id:217280) triggered by 104.168.144.252 (client-104-168-144-252.hostwin ... show more (mod_security) mod_security (id:217280) triggered by 104.168.144.252 (client-104-168-144-252.hostwindsdns.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Mar 19 02:58:50.432967 2024] [security2:error] [pid 3971:tid 47203034859264] [client 104.168.144.252:64800] [client 104.168.144.252] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\n|\\\\r)+(?:get|post|head|options|connect|put|delete|trace|propfind|propatch|mkcol|copy|move|lock|unlock)\\\\s+" at MATCHED_VAR. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/12_HTTP_Protocol.conf"] [line "137"] [id "217280"] [rev "6"] [msg "COMODO WAF: HTTP Request Smuggling Attack||www.chelseyrae.com|F|2"] [data "Matched Data: get found within MATCHED_VAR"] [severity "CRITICAL"] [tag "CWAF"] [tag "Protocol"] [hostname "www.chelseyrae.com"] [uri "/contact-me/"] [unique_id "Zfk3qiWOsvsUNOPrKTv7UgAAAZE"], referer: http://www.chelseyrae.com/contact-me/ show less
Brute-Force
Bad Web Bot
Web App Attack
backslash
2024-03-19 06:23:01
(6 months ago)
Web Spam
Anonymous
2024-03-19 04:41:27
(6 months ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
gurnip
2024-03-19 04:27:59
(6 months ago)
Contact form spam of type 'other'.
Web Spam
10dencehispahard SL
2024-03-19 03:00:09
(6 months ago)
Unauthorized login attempts [ accesslogs]
Brute-Force
Anonymous
2024-03-19 01:49:51
(6 months ago)
RUPLDE WEBFORM SPAM 104.168.144.252 (client-104-168-144-252.hostwindsdns.com)
Web Spam
hc
2024-03-19 01:13:00
(6 months ago)
Frau
Toni Lovett
15 Devon Street
Cowandilla
(08) 8267 4846
... show more Frau
Toni Lovett
15 Devon Street
Cowandilla
(08) 8267 4846
[email protected]
Hey , Starting a profitable red hot leads finding & closing agency looks like a golden egg laying hen… But, in reality, getting even a single targeted lead for your business is something that takes tons of time, energy & money. Now, just imagine… What if we told you that we’ve got the complete solution to start your own profitable lead finding & closing agency & provide needy services to hungry business owners? Sounds a fair deal… Click Here To Watch SendBuddy AI Into Action: https://www.solveques.xyz/sendbuddyai Here’s what makes it the ultimate WINNER: · No Working Tirelessly For Identifying The Right Audience For Your Offers · No Wasting Time Planning, Evaluating & Creating Relevant Techniques To Close Clients · No Filtering Leads By Searching, Finding & Hiring Expensive Freelancers & Third Party Apps · No Paying Huge Monthly Fees To Create Proposal Templates For Approaching Audience · No Worrying About Crea show less
Web Spam
TPI-Abuse
2024-03-18 23:27:52
(6 months ago)
(mod_security) mod_security (id:217280) triggered by 104.168.144.252 (client-104-168-144-252.hostwin ... show more (mod_security) mod_security (id:217280) triggered by 104.168.144.252 (client-104-168-144-252.hostwindsdns.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Mar 18 19:27:48.797222 2024] [security2:error] [pid 22294] [client 104.168.144.252:65221] [client 104.168.144.252] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\n|\\\\r)+(?:get|post|head|options|connect|put|delete|trace|propfind|propatch|mkcol|copy|move|lock|unlock)\\\\s+" at MATCHED_VAR. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/12_HTTP_Protocol.conf"] [line "137"] [id "217280"] [rev "6"] [msg "COMODO WAF: HTTP Request Smuggling Attack||www.kreweofblackbeardsrevenge.com|F|2"] [data "Matched Data: get found within MATCHED_VAR"] [severity "CRITICAL"] [tag "CWAF"] [tag "Protocol"] [hostname "www.kreweofblackbeardsrevenge.com"] [uri "/contact_us.html"] [unique_id "ZfjN9EKG7fi1Gqk_dmyVpwAAAAM"], referer: https://www.kreweofblackbeardsrevenge.com/contact_us.html show less
Brute-Force
Bad Web Bot
Web App Attack