TPI-Abuse
2023-12-01 05:54:35
(20 hours ago)
(mod_security) mod_security (id:210730) triggered by 15.235.140.144 (vps-4bd67d79.vps.ovh.ca): 1 in ... show more (mod_security) mod_security (id:210730) triggered by 15.235.140.144 (vps-4bd67d79.vps.ovh.ca): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri Dec 01 00:54:31.306447 2023] [security2:error] [pid 3954] [client 15.235.140.144:41550] [client 15.235.140.144] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||baltimoreschoolfordrummin.benshermanguitar.com|F|2"] [data ".dockerfile.bak"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "baltimoreschoolfordrummin.benshermanguitar.com"] [uri "/.Dockerfile.bak"] [unique_id "ZWl1F6P66RYDuFPYJdBRywAAAAM"] show less
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
2023-11-30 00:20:52
(2 days ago)
$f2bV_matches
Brute-Force
SSH
GAS
2023-11-29 10:36:03
(2 days ago)
\x16\x03\x01 - -
Port Scan
Hacking
Birdflew
2023-11-29 01:31:13
(3 days ago)
Port scanning
Hacking
TPI-Abuse
2023-11-28 08:08:59
(3 days ago)
(mod_security) mod_security (id:210730) triggered by 15.235.140.144 (vps-4bd67d79.vps.ovh.ca): 1 in ... show more (mod_security) mod_security (id:210730) triggered by 15.235.140.144 (vps-4bd67d79.vps.ovh.ca): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Nov 28 03:08:57.841119 2023] [security2:error] [pid 28741] [client 15.235.140.144:33590] [client 15.235.140.144] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "4"] [msg "COMODO WAF: URL file extension is restricted by policy||zztp.ws|F|2"] [data ".dockerfile.bak"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "zztp.ws"] [uri "/.Dockerfile.bak"] [unique_id "ZWWgGbJQyjjBJpTlSY7PiwAAAAw"] show less
Brute-Force
Bad Web Bot
Web App Attack
niceshops.com
2023-11-27 08:49:47
(4 days ago)
Web Attack ([27/Nov/2023:09:49:38.339] GET /.aws/config)
Web App Attack
TPI-Abuse
2023-11-27 07:44:51
(4 days ago)
(mod_security) mod_security (id:210730) triggered by 15.235.140.144 (vps-4bd67d79.vps.ovh.ca): 1 in ... show more (mod_security) mod_security (id:210730) triggered by 15.235.140.144 (vps-4bd67d79.vps.ovh.ca): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Nov 27 02:44:45.630244 2023] [security2:error] [pid 32531:tid 47604788442880] [client 15.235.140.144:43328] [client 15.235.140.144] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||aafm.us|F|2"] [data ".dockerfile.bak"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "aafm.us"] [uri "/.Dockerfile.bak"] [unique_id "ZWRI7efTsIoqEteCxL8PqgAAABU"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2023-11-27 06:46:41
(4 days ago)
(mod_security) mod_security (id:210730) triggered by 15.235.140.144 (vps-4bd67d79.vps.ovh.ca): 1 in ... show more (mod_security) mod_security (id:210730) triggered by 15.235.140.144 (vps-4bd67d79.vps.ovh.ca): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Nov 27 01:46:34.816683 2023] [security2:error] [pid 21869] [client 15.235.140.144:49570] [client 15.235.140.144] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "4"] [msg "COMODO WAF: URL file extension is restricted by policy||callalbany.com|F|2"] [data ".dockerfile.bak"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "callalbany.com"] [uri "/.Dockerfile.bak"] [unique_id "ZWQ7SgcPJz6c4F-P9fPfGAAAAAU"] show less
Brute-Force
Bad Web Bot
Web App Attack
Birdflew
2023-11-27 00:34:42
(5 days ago)
Port scanning
Hacking
Anonymous
2023-11-26 09:46:39
(5 days ago)
*Port Scan* detected from 15.235.140.144 (SG/Singapore/vps-4bd67d79.vps.ovh.ca). 11 hits in the last ... show more *Port Scan* detected from 15.235.140.144 (SG/Singapore/vps-4bd67d79.vps.ovh.ca). 11 hits in the last 195 seconds; Ports: *; Direction: in; Trigger: PS_LIMIT show less
Brute-Force
TPI-Abuse
2023-11-25 04:57:06
(6 days ago)
(mod_security) mod_security (id:210492) triggered by 15.235.140.144 (vps-4bd67d79.vps.ovh.ca): 1 in ... show more (mod_security) mod_security (id:210492) triggered by 15.235.140.144 (vps-4bd67d79.vps.ovh.ca): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri Nov 24 23:57:00.632197 2023] [security2:error] [pid 20779] [client 15.235.140.144:34580] [client 15.235.140.144] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "/sftp-config.json" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "4bearspress.wolter-hausser.com"] [uri "/sftp-config.json"] [unique_id "ZWF-nGQolDHwfDRp863ERwAAAAo"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2023-11-22 04:37:21
(1 week ago)
(mod_security) mod_security (id:210730) triggered by 15.235.140.144 (vps-4bd67d79.vps.ovh.ca): 1 in ... show more (mod_security) mod_security (id:210730) triggered by 15.235.140.144 (vps-4bd67d79.vps.ovh.ca): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Nov 21 23:37:15.620784 2023] [security2:error] [pid 17988] [client 15.235.140.144:33682] [client 15.235.140.144] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "4"] [msg "COMODO WAF: URL file extension is restricted by policy||efgenios.com|F|2"] [data ".dockerfile.bak"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "efgenios.com"] [uri "/.Dockerfile.bak"] [unique_id "ZV2Fe5CH2hRBteOn42918QAAAAE"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2023-11-20 04:50:17
(1 week ago)
(mod_security) mod_security (id:210492) triggered by 15.235.140.144 (vps-4bd67d79.vps.ovh.ca): 1 in ... show more (mod_security) mod_security (id:210492) triggered by 15.235.140.144 (vps-4bd67d79.vps.ovh.ca): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Nov 19 23:50:09.368747 2023] [security2:error] [pid 26984:tid 47846560667392] [client 15.235.140.144:52856] [client 15.235.140.144] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "/.env" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "7sons.net"] [uri "/.env.bak"] [unique_id "ZVrlgWSYWzffoUKCCxemTgAAAQ0"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2023-11-18 09:11:24
(1 week ago)
(mod_security) mod_security (id:210730) triggered by 15.235.140.144 (vps-4bd67d79.vps.ovh.ca): 1 in ... show more (mod_security) mod_security (id:210730) triggered by 15.235.140.144 (vps-4bd67d79.vps.ovh.ca): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 18 04:11:21.346744 2023] [security2:error] [pid 9141] [client 15.235.140.144:52440] [client 15.235.140.144] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||natashahenry.co.uk|F|2"] [data ".dockerfile.bak"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "natashahenry.co.uk"] [uri "/.Dockerfile.bak"] [unique_id "ZVh_uZIqLquQQYYyeaqd5QAAAAU"] show less
Brute-Force
Bad Web Bot
Web App Attack
mnsf
2023-11-17 12:04:30
(2 weeks ago)
Too many Status 40X (14)
Request Overload (111)
Brute-Force
Web App Attack