Swiptly
|
|
WordPress xmlrpc spam or enumeration
...
|
Web Spam
Bad Web Bot
Web App Attack
|
|
Anonymous
|
|
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
|
Brute-Force
SSH
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 119.59.120.24 (-): 1 in the last 300 secs; Port ... show more(mod_security) mod_security (id:225170) triggered by 119.59.120.24 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri Dec 06 06:47:16.392096 2024] [security2:error] [pid 3251:tid 3251] [client 119.59.120.24:39878] [client 119.59.120.24] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||modalsoftware.mainstreetofficesuites.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "modalsoftware.mainstreetofficesuites.com"] [uri "/wp-json/wp/v2/users"] [unique_id "Z1LkRFEyz0J8dLPQ6gpRhAAAABc"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 119.59.120.24 (-): 1 in the last 300 secs; Port ... show more(mod_security) mod_security (id:225170) triggered by 119.59.120.24 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri Dec 06 00:14:18.072465 2024] [security2:error] [pid 10403:tid 10403] [client 119.59.120.24:35082] [client 119.59.120.24] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.Go4Food.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.go4food.com"] [uri "/wp-json/wp/v2/users"] [unique_id "Z1KIKrlI2zWSZk66o2U9sQAAAA4"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 119.59.120.24 (-): 1 in the last 300 secs; Port ... show more(mod_security) mod_security (id:225170) triggered by 119.59.120.24 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Thu Dec 05 21:58:39.260538 2024] [security2:error] [pid 3923694:tid 3923694] [client 119.59.120.24:59988] [client 119.59.120.24] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||stationrestaurant.ca|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "stationrestaurant.ca"] [uri "/wp-json/wp/v2/users"] [unique_id "Z1JoXwtRwFYvOZLy38_jyAAAAAI"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 119.59.120.24 (-): 1 in the last 300 secs; Port ... show more(mod_security) mod_security (id:225170) triggered by 119.59.120.24 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Thu Dec 05 10:30:23.926707 2024] [security2:error] [pid 9667:tid 9667] [client 119.59.120.24:32778] [client 119.59.120.24] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.airdriedrivingschool.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.airdriedrivingschool.com"] [uri "/wp-json/wp/v2/users"] [unique_id "Z1HHDyTJVDy1nkIWm5wBggAAAAU"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 119.59.120.24 (-): 1 in the last 300 secs; Port ... show more(mod_security) mod_security (id:225170) triggered by 119.59.120.24 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Thu Dec 05 07:21:30.906082 2024] [security2:error] [pid 11398:tid 11409] [client 119.59.120.24:42732] [client 119.59.120.24] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||killasgarage.bike|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "killasgarage.bike"] [uri "/wp-json/wp/v2/users"] [unique_id "Z1GaysILMYLCIG17twCwZQAAAEI"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
URAN Publishing Service
|
|
119.59.120.24 - - [04/Dec/2024:17:25:52 +0200] "POST /xmlrpc.php HTTP/1.1" 404 286 "-" "Mozilla/5.0 ... show more119.59.120.24 - - [04/Dec/2024:17:25:52 +0200] "POST /xmlrpc.php HTTP/1.1" 404 286 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.104 Safari/537.36"
119.59.120.24 - - [04/Dec/2024:17:25:53 +0200] "POST /wordpress/xmlrpc.php HTTP/1.1" 404 286 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.104 Safari/537.36"
... show less
|
Web App Attack
|
|
Anonymous
|
|
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
|
Brute-Force
SSH
|
|
selahattinalan
|
|
4:12:17119.59.120.24 - - [01/Dec/2024:07:51:12 +0300] "POST /xmlrpc.php HTTP/1.1" 200 4790 "-" "Mozi ... show more4:12:17119.59.120.24 - - [01/Dec/2024:07:51:12 +0300] "POST /xmlrpc.php HTTP/1.1" 200 4790 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:63.0) Gecko/20100101 Firefox/63.0" show less
|
Brute-Force
|
|
Anonymous
|
|
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
|
Brute-Force
SSH
|
|
corthorn
|
|
119.59.120.24 - - [28/Nov/2024:15:46:07 +0100] "POST /xmlrpc.php HTTP/1.1" 403 4158 "-" "Mozilla/5.0 ... show more119.59.120.24 - - [28/Nov/2024:15:46:07 +0100] "POST /xmlrpc.php HTTP/1.1" 403 4158 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:85.0) Gecko/20100101 Firefox/85.0"
... show less
|
Brute-Force
|
|
Anonymous
|
|
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
|
Brute-Force
SSH
|
|
corthorn
|
|
119.59.120.24 - - [28/Nov/2024:07:05:19 +0100] "POST /xmlrpc.php HTTP/1.1" 403 4158 "-" "Mozilla/5.0 ... show more119.59.120.24 - - [28/Nov/2024:07:05:19 +0100] "POST /xmlrpc.php HTTP/1.1" 403 4158 "-" "Mozilla/5.0 (Linux; Android 10; LM-X420) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Mobile Safari/537.36"
... show less
|
Brute-Force
|
|
octageeks.com
|
|
Wordpress malicious attack:[octaxmlrpc]
|
Web App Attack
|
|