TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 156.233.84.213 (-): 1 in the last 300 secs; Por ... show more(mod_security) mod_security (id:225170) triggered by 156.233.84.213 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Dec 21 05:43:13.487295 2024] [security2:error] [pid 575053:tid 575053] [client 156.233.84.213:23807] [client 156.233.84.213] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||passy.us|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "passy.us"] [uri "/wp-json/wp/v2/users"] [unique_id "Z2abwUcaj7azU0pnab1zngAAAAg"], referer: https://www.google.com show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
Ba-Yu
|
|
WordPress bruteforce
|
Web Spam
Hacking
Brute-Force
Exploited Host
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 156.233.84.213 (-): 1 in the last 300 secs; Por ... show more(mod_security) mod_security (id:225170) triggered by 156.233.84.213 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Dec 16 14:08:41.508847 2024] [security2:error] [pid 20693:tid 20693] [client 156.233.84.213:21039] [client 156.233.84.213] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||oceansgift.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "oceansgift.com"] [uri "/wp-json/wp/v2/users"] [unique_id "Z2B6ucaFvrK4jGQyhAZLnQAAAAY"], referer: https://www.google.com show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 156.233.84.213 (-): 1 in the last 300 secs; Por ... show more(mod_security) mod_security (id:225170) triggered by 156.233.84.213 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Dec 16 09:35:57.664104 2024] [security2:error] [pid 23617:tid 23617] [client 156.233.84.213:24715] [client 156.233.84.213] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||baker15.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "baker15.com"] [uri "/wp-json/wp/v2/users"] [unique_id "Z2A6zUCyZLCdMB0AOgEALgAAAAU"], referer: https://www.google.com show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
Anonymous
|
|
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
|
Brute-Force
SSH
|
|
MAGIC
|
|
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
|
DDoS Attack
Bad Web Bot
|
|
Anonymous
|
|
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
|
Brute-Force
SSH
|
|
syokadmin
|
|
(cpanel) Failed cPanel login from 156.233.84.213 (BR/Brazil/-): 1 in the last 3600 secs
|
Brute-Force
Web App Attack
|
|
Anonymous
|
|
Automatic report - Vulnerability scan
/RDWeb/Pages/en-US/login.aspx
|
Web App Attack
|
|
Anonymous
|
|
Automatic report - Vulnerability scan
/RDWeb/Pages/en-US/login.aspx
|
Web App Attack
|
|
hostseries
|
|
Trigger: LF_DISTATTACK
|
Brute-Force
|
|