wnbhosting.dk
|
|
WP xmlrpc [2024-10-17T07:07:00+02:00]
|
Hacking
Web App Attack
|
|
Malta
|
|
162.0.217.45 - - [16/Oct/2024:18:48:40 +0200] "POST /xmlrpc.php HTTP/1.1" "Mozilla/5.0 (Windows NT 1 ... show more162.0.217.45 - - [16/Oct/2024:18:48:40 +0200] "POST /xmlrpc.php HTTP/1.1" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36" show less
|
Hacking
Web App Attack
|
|
MAGIC
|
|
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
|
DDoS Attack
Bad Web Bot
|
|
Anonymous
|
|
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
|
Brute-Force
SSH
|
|
ToDi
|
|
WebAttack or semilar from 162.0.217.45
|
Web App Attack
|
|
INTEQ
|
|
Web attack from 162.0.217.45
|
Web App Attack
|
|
polycoda
|
|
🔑 Probes for xmlrpc.php everywhere
|
Hacking
Web App Attack
|
|
Anonymous
|
|
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
|
Brute-Force
SSH
|
|
Anonymous
|
|
Malicious activity detected
|
Hacking
Brute-Force
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 162.0.217.45 (premium206.web-hosting.com): 1 in ... show more(mod_security) mod_security (id:225170) triggered by 162.0.217.45 (premium206.web-hosting.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Oct 14 11:07:23.341816 2024] [security2:error] [pid 24347:tid 24347] [client 162.0.217.45:37522] [client 162.0.217.45] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||cemesur-vision21.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "cemesur-vision21.com"] [uri "/wp-json/wp/v2/users"] [unique_id "Zw0zq65wJE2vyjwTfP6DIAAAAA4"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 162.0.217.45 (premium206.web-hosting.com): 1 in ... show more(mod_security) mod_security (id:225170) triggered by 162.0.217.45 (premium206.web-hosting.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Oct 14 10:01:12.689657 2024] [security2:error] [pid 13171:tid 13171] [client 162.0.217.45:46136] [client 162.0.217.45] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.telecompros.net|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.telecompros.net"] [uri "/wp-json/wp/v2/users"] [unique_id "Zw0kKH2krDiEbyt4s3Jk_wAAAAk"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 162.0.217.45 (premium206.web-hosting.com): 1 in ... show more(mod_security) mod_security (id:225170) triggered by 162.0.217.45 (premium206.web-hosting.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Oct 14 09:25:27.132418 2024] [security2:error] [pid 30625:tid 30625] [client 162.0.217.45:47758] [client 162.0.217.45] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.gabbyspetnanny.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.gabbyspetnanny.com"] [uri "/wp-json/wp/v2/users"] [unique_id "Zw0bx3oWJCLqsAMaFU-7JQAAAAQ"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 162.0.217.45 (premium206.web-hosting.com): 1 in ... show more(mod_security) mod_security (id:225170) triggered by 162.0.217.45 (premium206.web-hosting.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Oct 14 08:56:23.416148 2024] [security2:error] [pid 7752:tid 7752] [client 162.0.217.45:40332] [client 162.0.217.45] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||beatthegm.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "beatthegm.com"] [uri "/wp-json/wp/v2/users"] [unique_id "Zw0U91VhrDP4fBxC2VhYWAAAAAo"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 162.0.217.45 (premium206.web-hosting.com): 1 in ... show more(mod_security) mod_security (id:225170) triggered by 162.0.217.45 (premium206.web-hosting.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Oct 14 07:54:18.727905 2024] [security2:error] [pid 24118:tid 24118] [client 162.0.217.45:38432] [client 162.0.217.45] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.lajoze.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.lajoze.com"] [uri "/wp-json/wp/v2/users"] [unique_id "Zw0GagJFMMN5W7Xdi7nZywAAAAc"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
Anonymous
|
|
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
|
Brute-Force
SSH
|
|