Dave Brooks
2024-09-30 15:48:00
(1 month ago)
porn via contact form
Email Spam
abrsanz
2024-09-28 10:04:00
(1 month ago)
available at an unbeatable one-time price
Web Spam
Dave Brooks
2024-09-28 06:23:18
(1 month ago)
contact form abuse
Web Spam
Email Spam
Brute-Force
Anonymous
2024-09-28 02:42:40
(1 month ago)
ALTB WEBFORM SPAM 104.168.219.242 (client-104-168-219-242.hostwindsdns.com)
Web Spam
TPI-Abuse
2024-09-27 23:56:44
(1 month ago)
(mod_security) mod_security (id:217280) triggered by 104.168.219.242 (client-104-168-219-242.hostwin ... show more (mod_security) mod_security (id:217280) triggered by 104.168.219.242 (client-104-168-219-242.hostwindsdns.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri Sep 27 19:56:40.131851 2024] [security2:error] [pid 336281:tid 336281] [client 104.168.219.242:65344] [client 104.168.219.242] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\n|\\\\r)+(?:get|post|head|options|connect|put|delete|trace|propfind|propatch|mkcol|copy|move|lock|unlock)\\\\s+" at MATCHED_VAR. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/12_HTTP_Protocol.conf"] [line "137"] [id "217280"] [rev "6"] [msg "COMODO WAF: HTTP Request Smuggling Attack||accu-tuner.com|F|2"] [data "Matched Data: get found within MATCHED_VAR"] [severity "CRITICAL"] [tag "CWAF"] [tag "Protocol"] [hostname "accu-tuner.com"] [uri "/php/sendmail.php"] [unique_id "ZvdGOPihHV5m8A9by9iHnAAAAAA"], referer: http://accu-tuner.com/contact.html show less
Brute-Force
Bad Web Bot
Web App Attack
France Artisanat
2024-09-27 23:09:06
(1 month ago)
Hey,
It's official – FlaxxaWapi is LIVE�� and businesses are already jum ... show more Hey,
It's official – FlaxxaWapi is LIVE�� and businesses are already jumping on board to secure access.
Now, it’s your turn to see what all the buzz is about. : https://www.nowbusiness.info/flaxxawapi
FlaxxaWapi is the world’s FIRST fully-integrated WhatsApp marketing automation platform, and for a limited time only, it’s available at an unbeatable one-time price.
Here’s a glimpse of what you can do with FlaxxaWapi:
â¡ï¸ Automated WhatsApp Marketing: Send high-response, targeted messages effortlessly.
â¡ï¸ Build and Nurture Relationships: Engage your audience with personalized WhatsApp communications.
â¡ï¸ No-Code Chatbots: Create smart bots that respond instantly to inquiries and handle conversations at scale.
â¡ï¸ Organize and Segment: Use tags and advanced filters to reach the right people at the right time.
â¡ï¸ Automated Drip Campaigns: Set up sequences to engage prospects and drive conversions on au show less
Web Spam
gurnip
2024-09-27 22:38:15
(1 month ago)
Contact form spam of type 'other'.
Web Spam
maximonline.co.za
2024-09-27 22:30:12
(1 month ago)
Contact form spam.
Web Spam
TPI-Abuse
2024-09-27 22:25:55
(1 month ago)
(mod_security) mod_security (id:217280) triggered by 104.168.219.242 (client-104-168-219-242.hostwin ... show more (mod_security) mod_security (id:217280) triggered by 104.168.219.242 (client-104-168-219-242.hostwindsdns.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri Sep 27 18:25:47.560760 2024] [security2:error] [pid 23620:tid 23620] [client 104.168.219.242:61433] [client 104.168.219.242] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\n|\\\\r)+(?:get|post|head|options|connect|put|delete|trace|propfind|propatch|mkcol|copy|move|lock|unlock)\\\\s+" at MATCHED_VAR. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/12_HTTP_Protocol.conf"] [line "137"] [id "217280"] [rev "6"] [msg "COMODO WAF: HTTP Request Smuggling Attack||dibaplac.com|F|2"] [data "Matched Data: get found within MATCHED_VAR"] [severity "CRITICAL"] [tag "CWAF"] [tag "Protocol"] [hostname "dibaplac.com"] [uri "/index-4.html"] [unique_id "Zvcw62WtXxWBGVM9HZNGSAAAABc"], referer: https://dibaplac.com/index-4.html show less
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
2024-09-27 21:38:39
(1 month ago)
PSCDE WEBFORM SPAM 104.168.219.242 (client-104-168-219-242.hostwindsdns.com)
Web Spam
TPI-Abuse
2024-09-27 20:20:36
(1 month ago)
(mod_security) mod_security (id:217280) triggered by 104.168.219.242 (client-104-168-219-242.hostwin ... show more (mod_security) mod_security (id:217280) triggered by 104.168.219.242 (client-104-168-219-242.hostwindsdns.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri Sep 27 16:20:31.781460 2024] [security2:error] [pid 28585:tid 28606] [client 104.168.219.242:53084] [client 104.168.219.242] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\n|\\\\r)+(?:get|post|head|options|connect|put|delete|trace|propfind|propatch|mkcol|copy|move|lock|unlock)\\\\s+" at MATCHED_VAR. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/12_HTTP_Protocol.conf"] [line "137"] [id "217280"] [rev "6"] [msg "COMODO WAF: HTTP Request Smuggling Attack||pecanvalleyestates.net|F|2"] [data "Matched Data: get found within MATCHED_VAR"] [severity "CRITICAL"] [tag "CWAF"] [tag "Protocol"] [hostname "pecanvalleyestates.net"] [uri "/"] [unique_id "ZvcTj6ldT2INDrBxdrCyiAAAANM"], referer: https://pecanvalleyestates.net/ show less
Brute-Force
Bad Web Bot
Web App Attack
backslash
2024-09-27 18:10:12
(1 month ago)
block ruleset 6A1105329D233F6F53B9B61CE056BD4DAAE75AB4
Web Spam
TPI-Abuse
2024-09-27 16:16:36
(1 month ago)
(mod_security) mod_security (id:217280) triggered by 104.168.219.242 (client-104-168-219-242.hostwin ... show more (mod_security) mod_security (id:217280) triggered by 104.168.219.242 (client-104-168-219-242.hostwindsdns.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri Sep 27 12:16:31.516387 2024] [security2:error] [pid 22114:tid 22114] [client 104.168.219.242:63644] [client 104.168.219.242] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\n|\\\\r)+(?:get|post|head|options|connect|put|delete|trace|propfind|propatch|mkcol|copy|move|lock|unlock)\\\\s+" at MATCHED_VAR. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/12_HTTP_Protocol.conf"] [line "137"] [id "217280"] [rev "6"] [msg "COMODO WAF: HTTP Request Smuggling Attack||www.cajunpicasso.com|F|2"] [data "Matched Data: get found within MATCHED_VAR"] [severity "CRITICAL"] [tag "CWAF"] [tag "Protocol"] [hostname "www.cajunpicasso.com"] [uri "/wp-admin/admin-ajax.php"] [unique_id "ZvbaX78dde-V2Xwt3L_GdwAAAAk"], referer: http://www.cajunpicasso.com/contact/ show less
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
2024-09-27 13:30:49
(1 month ago)
SPROVFR WEBFORM SPAM 104.168.219.242 (client-104-168-219-242.hostwindsdns.com)
Web Spam
el-brujo
2024-09-27 13:28:13
(1 month ago)
27/Sep/2024:15:28:12.702324 +0200Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client ... show more 27/Sep/2024:15:28:12.702324 +0200Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client 104.168.219.242] ModSecurity: Rule 55aa39cb1470 [id "932140"][file "/etc/httpd/modsecurity.d/activated_rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf"][line "413"] - Execution error - PCRE limits exceeded (-8): (null). [hostname "www.hostench.eu"] [uri "/wp-json/contact-form-7/v1/contact-forms/296/feedback"] [unique_id "Zvay7Efd2mjV56joxuvZyAAAkiY"]
... show less
Hacking
Web App Attack