TPI-Abuse
2024-11-25 22:29:28
(2 weeks ago)
(mod_security) mod_security (id:225170) triggered by 154.213.197.92 (-): 1 in the last 300 secs; Por ... show more (mod_security) mod_security (id:225170) triggered by 154.213.197.92 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Nov 25 17:29:23.884894 2024] [security2:error] [pid 27202:tid 27202] [client 154.213.197.92:28971] [client 154.213.197.92] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||bobfaw.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "bobfaw.com"] [uri "/wp-json/wp/v2/users"] [unique_id "Z0T6QxuYoBi-oBSMGr2ICgAAABQ"], referer: https://www.google.com show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-11-25 01:42:28
(2 weeks ago)
(mod_security) mod_security (id:225170) triggered by 154.213.197.92 (-): 1 in the last 300 secs; Por ... show more (mod_security) mod_security (id:225170) triggered by 154.213.197.92 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Nov 24 20:42:21.314812 2024] [security2:error] [pid 24751:tid 24751] [client 154.213.197.92:25727] [client 154.213.197.92] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||staben.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "staben.com"] [uri "/wp-json/wp/v2/users"] [unique_id "Z0PV_QjijL-x_G1MmxHrFAAAAA0"], referer: https://www.google.com show less
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
2024-11-16 23:49:19
(3 weeks ago)
[17/Nov/2024:10:49:18 +1100] "GET /wp-json/wp/v2/users HTTP/1.1" 302 237 "https://www.google.com" "M ... show more [17/Nov/2024:10:49:18 +1100] "GET /wp-json/wp/v2/users HTTP/1.1" 302 237 "https://www.google.com" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36" show less
Hacking
Web App Attack
TPI-Abuse
2024-11-16 13:48:28
(4 weeks ago)
(mod_security) mod_security (id:225170) triggered by 154.213.197.92 (-): 1 in the last 300 secs; Por ... show more (mod_security) mod_security (id:225170) triggered by 154.213.197.92 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 16 08:48:22.964736 2024] [security2:error] [pid 22733:tid 22733] [client 154.213.197.92:11511] [client 154.213.197.92] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||chapa.net|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "chapa.net"] [uri "/wp-json/wp/v2/users"] [unique_id "ZziiphKs09ELNaMZhO4tpQAAAA0"], referer: https://www.google.com show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-11-16 09:30:28
(4 weeks ago)
(mod_security) mod_security (id:225170) triggered by 154.213.197.92 (-): 1 in the last 300 secs; Por ... show more (mod_security) mod_security (id:225170) triggered by 154.213.197.92 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 16 04:30:20.793715 2024] [security2:error] [pid 3768:tid 3768] [client 154.213.197.92:12137] [client 154.213.197.92] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||chezlubacov.org|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "chezlubacov.org"] [uri "/wp-json/wp/v2/users"] [unique_id "ZzhmLKIoQyDjNtgIUfjzGAAAAAo"], referer: https://www.google.com show less
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
2024-11-15 05:31:28
(4 weeks ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
TPI-Abuse
2024-11-14 07:31:14
(1 month ago)
(mod_security) mod_security (id:225170) triggered by 154.213.197.92 (-): 1 in the last 300 secs; Por ... show more (mod_security) mod_security (id:225170) triggered by 154.213.197.92 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Thu Nov 14 02:31:10.332774 2024] [security2:error] [pid 192815:tid 192815] [client 154.213.197.92:44839] [client 154.213.197.92] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||barreda.org|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "barreda.org"] [uri "/wp-json/wp/v2/users"] [unique_id "ZzWnPoyrhfUxpdMAqjbuKwAAAAQ"], referer: https://www.google.com show less
Brute-Force
Bad Web Bot
Web App Attack
PulseServers
2024-11-13 17:53:49
(1 month ago)
Malicious Web Traffic - Exploit probing, request floods, etc. on a server hosted by PulseServers.com ... show more Malicious Web Traffic - Exploit probing, request floods, etc. on a server hosted by PulseServers.com - ISUS2
... show less
DDoS Attack
Exploited Host
Anonymous
2024-11-12 13:17:00
(1 month ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
PulseServers
2024-11-09 03:31:00
(1 month ago)
Malicious Web Traffic - Exploit probing, request floods, etc. on a server hosted by PulseServers.com ... show more Malicious Web Traffic - Exploit probing, request floods, etc. on a server hosted by PulseServers.com - ISUK1
... show less
DDoS Attack
Exploited Host
Anonymous
2024-11-08 09:51:48
(1 month ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
PulseServers
2024-11-08 00:52:33
(1 month ago)
Malicious Web Traffic - Exploit probing, request floods, etc. on a server hosted by PulseServers.com ... show more Malicious Web Traffic - Exploit probing, request floods, etc. on a server hosted by PulseServers.com - ISUK1
... show less
DDoS Attack
Exploited Host
PulseServers
2024-11-07 05:17:38
(1 month ago)
Malicious Web Traffic - Exploit probing, request floods, etc. on a server hosted by PulseServers.com ... show more Malicious Web Traffic - Exploit probing, request floods, etc. on a server hosted by PulseServers.com - ISCA2
... show less
DDoS Attack
Exploited Host
MAGIC
2024-11-06 02:01:32
(1 month ago)
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot
PulseServers
2024-11-05 23:51:56
(1 month ago)
Malicious Web Traffic - Exploit probing, request floods, etc. on a server hosted by PulseServers.com ... show more Malicious Web Traffic - Exploit probing, request floods, etc. on a server hosted by PulseServers.com - ISUK2
... show less
DDoS Attack
Exploited Host