rsa
|
|
GET /media.php HTTP/1.1
|
Hacking
Brute-Force
Web App Attack
|
|
Anonymous
|
|
13.74.150.68 - - [14/Nov/2024:14:49:33 +0100] "GET /artechlab-amsterdam/wp-admin/wp-login.php HTTP/1 ... show more13.74.150.68 - - [14/Nov/2024:14:49:33 +0100] "GET /artechlab-amsterdam/wp-admin/wp-login.php HTTP/1.1" 404 57911 "-" "-"
13.74.150.68 - - [14/Nov/2024:14:49:48 +0100] "GET /artechlab-amsterdam/wp-includes/wp-login.php HTTP/1.1" 404 57914 "-" "-"
13.74.150.68 - - [14/Nov/2024:14:49:49 +0100] "GET /artechlab-amsterdam/wp-includes/SimplePie/wp-login.php HTTP/1.1" 404 57924 "-" "-"
13.74.150.68 - - [14/Nov/2024:14:50:05 +0100] "GET /artechlab-amsterdam/wp-admin/css/wp-login.php HTTP/1.1" 404 57921 "-" "-"
13.74.150.68 - - [14/Nov/2024:14:50:06 +0100] "GET /artechlab-amsterdam/wp-admin/images/wp-login.php HTTP/1.1" 404 57924 "-" "-"
13.74.150.68 - - [14/Nov/2024:14:50:10 +0100] "GET /artechlab-amsterdam/cgi-bin/wp-login.php HTTP/1.1" 404 57910 "-" "-"
13.74.150.68 - - [14/Nov/2024:14:50:18 +0100] "GET /artechlab-amsterdam/.well-known/wp-login.php HTTP/1.1" 404 57914 "-" "-"
... show less
|
Brute-Force
|
|
Anonymous
|
|
wordpress-trap
|
Web App Attack
|
|
strefapi_com
|
|
Brute-force web
...
|
Hacking
Brute-Force
Web App Attack
|
|
Anonymous
|
|
Ports: *; Direction: 0; Trigger: CT_LIMIT
|
Brute-Force
SSH
|
|
Epimetheus
|
|
Unauthorized access attempts:
From:
13.74.150.68
Method:
HTT ... show moreUnauthorized access attempts:
From:
13.74.150.68
Method:
HTTP GET
URI Path:
/cgi-bin/wp-login.php
UA:
"" show less
|
Web App Attack
|
|
mashamal
|
|
Vulnerability Probe
...
|
Web App Attack
|
|
WeekendWeb
|
|
Wordpress Vunerability attack
|
Web App Attack
|
|
Anonymous
|
|
Scenario: crowdsecurity/http-admin-interface-probing
|
Hacking
|
|
blinx
|
|
Suspicious activity detected by Modsecurity
|
Web Spam
Port Scan
Hacking
Bad Web Bot
Web App Attack
|
|
paulshipley.com.au
|
|
levellapromotions.com.au:443 13.74.150.68 - - [14/Nov/2024:10:06:39 +1100] "GET /wp-includes/certifi ... show morelevellapromotions.com.au:443 13.74.150.68 - - [14/Nov/2024:10:06:39 +1100] "GET /wp-includes/certificates/plugins.php HTTP/1.1" 404 145396 "-" "-"
levellapromotions.com.au:443 13.74.150.68 - - [14/Nov/2024:10:06:41 +1100] "GET /wp-admin/user/plugins.php HTTP/1.1" 404 142134 "-" "-"
levellapromotions.com.au:443 13.74.150.68 - - [14/Nov/2024:10:06:44 +1100] "GET /.well-known/acme-challenge/plugins.php HTTP/1.1" 404 142147 "-" "-"
levellapromotions.com.au:443 13.74.150.68 - - [14/Nov/2024:10:06:46 +1100] "GET /wp-includes/customize/plugins.php HTTP/1.1" 404 142142 "-" "-"
levellapromotions.com.au:443 13.74.150.68 - - [14/Nov/2024:10:06:49 +1100] "GET /wp-includes/SimplePie/plugins.php HTTP/1.1" 404 142142 "-" "-"
levellapromotions.com.au:443 13.74.150.68 - - [14/Nov/2024:10:06:51 +1100] "GET /wp-admin/css/colors/blue/plugins.php HTTP/1.1" 404 142147 "-" "-"
levellapromotions.com.au:443 13.74.150.68 - - [14/Nov/2024:10:06:54 +1100] "GET /wp-content/themes/plugins.php HTTP/1.1" 403 627 "-"
... show less
|
Web App Attack
|
|
AbuseBaer
|
|
access attempt detected by IDS script (A)
|
Web App Attack
|
|
Ba-Yu
|
|
General hacking/exploits/scanning
|
Web Spam
Hacking
Brute-Force
Exploited Host
Web App Attack
|
|
london2038.com
|
|
Probing for exploits
13.74.150.68 - - [13/Nov/2024:22:43:43 +0100] "GET /wp-includes/certifica ... show moreProbing for exploits
13.74.150.68 - - [13/Nov/2024:22:43:43 +0100] "GET /wp-includes/certificates/plugins.php HTTP/1.1" 301 169 "-" "-"
13.74.150.68 - - [13/Nov/2024:22:43:44 +0100] "GET /wp-admin/user/plugins.php HTTP/1.1" 301 169 "-" "-" show less
|
Hacking
Web App Attack
|
|
Anonymous
|
|
Fail2Ban apache-noscript
|
Bad Web Bot
|
|