This IP address has been reported a total of 61 times from 25 distinct sources.
128.199.116.110 was first reported on , and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.
Reporter
Date
Comment
Categories
Anonymous
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probin ... show moreAttacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools show less
(mod_security) mod_security (id:430036) triggered by 128.199.116.110 (SG/Singapore/-/Singapore/-): 1 ... show more(mod_security) mod_security (id:430036) triggered by 128.199.116.110 (SG/Singapore/-/Singapore/-): 1 in the last 3600 secs show less
[WedAug1021:49:52.6160432022][:error][pid31595:tid47921645111040][client128.199.116.110:46552][clien ... show more[WedAug1021:49:52.6160432022][:error][pid31595:tid47921645111040][client128.199.116.110:46552][client128.199.116.110]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch\"\(\?:\$mozilla\^\|mozilla/[45]\\\\\\\\.[1-9]\|\^mozilla/4\\\\\\\\.0\$\)\"atREQUEST_HEADERS:User-Agent.[file\"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf\"][line\"334\"][id\"330131\"][rev\"3\"][msg\"Atomicorp.comWAFRules:MaliciousBotBlocked\(FakeMozillaUserAgentStringDetected\)\"][severity\"CRITICAL\"][hostname\"delconews.ch\"][uri\"/index.php\"][unique_id\"YvQL4CC9azEXFxld5vnOKQAAABU\"]\,referer:delconews.ch[WedAug1021:49:55.9094512022][:error][pid16373:tid47921638807296][client128.199.116.110:48730][client128.199.116.110]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch\"\(\?:\$mozilla\^\|mozilla/[45]\\\\\\\\.[1-9]\|\^mozilla/4\\\\\\\\.0\$\)\"atREQUEST_HEADERS:User-Agent.[file\"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf\"][line\"334\"][id\"330131\"][rev\"3\"][msg\"Atomicorp.comWAFRules:MaliciousBotBlo show less
[WedAug1016:14:23.4475162022][:error][pid15129:tid47467563423488][client128.199.116.110:36776][clien ... show more[WedAug1016:14:23.4475162022][:error][pid15129:tid47467563423488][client128.199.116.110:36776][client128.199.116.110]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch\"\(\?:\$mozilla\^\|mozilla/[45]\\\\\\\\.[1-9]\|\^mozilla/4\\\\\\\\.0\$\)\"atREQUEST_HEADERS:User-Agent.[file\"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf\"][line\"334\"][id\"330131\"][rev\"3\"][msg\"Atomicorp.comWAFRules:MaliciousBotBlocked\(FakeMozillaUserAgentStringDetected\)\"][severity\"CRITICAL\"][hostname\"agilityrossoblu.ch\"][uri\"/wp-content/plugins/core-engine/index.php\"][unique_id\"YvO9P0JSrBio1A3qoZy-QQAAAFA\"]\,referer:agilityrossoblu.ch[WedAug1016:14:25.3919752022][:error][pid15320:tid47467559220992][client128.199.116.110:36844][client128.199.116.110]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch\"\(\?:\$mozilla\^\|mozilla/[45]\\\\\\\\.[1-9]\|\^mozilla/4\\\\\\\\.0\$\)\"atREQUEST_HEADERS:User-Agent.[file\"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf\"][line\"334\"][id\"330131\"][rev\"3\"] show less
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probin ... show moreAttacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools show less
Posting spam/hacking or other abusive activity.
Attack reported by Webbfabiken Security API - ... show morePosting spam/hacking or other abusive activity.
Attack reported by Webbfabiken Security API - WFSecAPI show less