Anonymous
07 Jun 2022
Web Form Spam: among them acquired 'Moral
Web Spam
trbs
06 Jun 2022
21,5-90/02 [bc00/m02] +168,00 PostRequest-Spammer scoring: nairobi
Web Spam
Public Admin
04 Jun 2022
2022/06/05 00:11:55 [error] 23168#23168: *30989 openat() "/etc/nginx/html/criptonize" failed (2: No ... show more 2022/06/05 00:11:55 [error] 23168#23168: *30989 openat() "/etc/nginx/html/criptonize" failed (2: No such file or directory), client: 167.86.97.162, server: localhost, request: "GET /criptonize HTTP/1.1", host: "88.99.231.108"
... show less
Brute-Force
Web App Attack
Anonymous
04 Jun 2022
Postfix SMTP rejection
Email Spam
GlobalSiteGuard
29 May 2022
Website login hacking attempts.
Hacking
Web App Attack
Anonymous
28 May 2022
SPROVFR WEBFORM SPAM 167.86.97.162 (vmi256789.contaboserver.net)
Web Spam
Maykson
17 May 2022
167.86.97.162 - - [17/May/2022:15:41:24 -0300] "GET /old-index.php?daksldlkdsadas=1 HTTP/1.1" 404 13 ... show more 167.86.97.162 - - [17/May/2022:15:41:24 -0300] "GET /old-index.php?daksldlkdsadas=1 HTTP/1.1" 404 13546 "adlfacility.com.br" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.75 Safari/537.36"
... show less
Exploited Host
Web App Attack
Maykson
17 May 2022
167.86.97.162 - - [17/May/2022:14:11:18 -0300] "GET /old-index.php?daksldlkdsadas=1 HTTP/1.1" 404 54 ... show more 167.86.97.162 - - [17/May/2022:14:11:18 -0300] "GET /old-index.php?daksldlkdsadas=1 HTTP/1.1" 404 549 "viaurbana.com.br" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.75 Safari/537.36"
... show less
Exploited Host
Web App Attack
Maykson
17 May 2022
167.86.97.162 - - [17/May/2022:13:01:22 -0300] "GET /old-index.php?daksldlkdsadas=1 HTTP/1.1" 404 59 ... show more 167.86.97.162 - - [17/May/2022:13:01:22 -0300] "GET /old-index.php?daksldlkdsadas=1 HTTP/1.1" 404 59316 "crnetbrasil.com.br" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.75 Safari/537.36"
... show less
Exploited Host
Web App Attack
Anonymous
16 May 2022
Malicious activity detected
Hacking
Brute-Force
el-brujo
16 May 2022
16/May/2022:19:22:22 +0200Apache-Error: [file "apache2_util.c"] [line 273] [level 3] [client 167.86. ... show more 16/May/2022:19:22:22 +0200Apache-Error: [file "apache2_util.c"] [line 273] [level 3] [client 167.86.97.162] ModSecurity: Warning. String match within ".asa/ .asax/ .ascx/ .axd/ .backup/ .bak/ .bat/ .cdx/ .cer/ .cfg/ .cmd/ .com/ .config/ .conf/ .cs/ .csproj/ .csr/ .dat/ .db/ .dbf/ .dll/ .dos/ .htr/ .htw/ .ida/ .idc/ .idq/ .inc/ .ini/ .key/ .licx/ .lnk/ .log/ .mdb/ .old/ .pass/ .pdb/ .pol/ .printer/ .pwd/ .rdb/ .resources/ .resx/ .sql/ .swp/ .sys/ .vb/ .vbs/ .vbproj/ .vsdisco/ .webinfo/ .xsd/ .xsx/" at TX:extension. [file "/etc/httpd/modsecurity.d/activated_rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "1034"] [id "920440"] [msg "URL file extension is restricted by policy"] [data ".com"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "oriolhostench.net"] [uri "/wp-includes/images/media/aya.p
... show less
Hacking
Web App Attack
Anonymous
16 May 2022
/wp-content/themes/twentytwenty/assets/aya.php
/wp-content/plugins/wordpress/aya.php
... show more /wp-content/themes/twentytwenty/assets/aya.php
/wp-content/plugins/wordpress/aya.php
/wp-content/plugins/dos2unix/dos2unix.php
wp-content/plugins/unicode/cgi.php show less
Brute-Force
Web App Attack
10dencehispahard SL
12 May 2022
Suspicious activity detected by Modsecurity [Application attack SQLI]
SQL Injection
Web App Attack
Anonymous
07 May 2022
167.86.97.162 - - [07/May/2022:18:23:40 +0200] "GET /wp-includes/images/smilies/content.php?520=1 HT ... show more 167.86.97.162 - - [07/May/2022:18:23:40 +0200] "GET /wp-includes/images/smilies/content.php?520=1 HTTP/1.1" 404 243 "test.n-soft.de" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.75 Safari/537.36"
167.86.97.162 - - [07/May/2022:18:27:05 +0200] "GET /wp-content/uploads/2020/radio.php?520=1 HTTP/1.1" 404 1286 "test.n-soft.de" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.75 Safari/537.36"
167.86.97.162 - - [07/May/2022:18:31:58 +0200] "GET /wp-includes/js/jquery/content.php?520=1 HTTP/1.1" 404 243 "test.n-soft.de" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.75 Safari/537.36"
167.86.97.162 - - [07/May/2022:18:40:00 +0200] "GET /wp-includes/images/media/2index.php?520=1 HTTP/1.1" 404 243 "test.n-soft.de" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.75 Safari/537.36"
... show less
Hacking
Bad Web Bot
mnsf
07 May 2022
Too many Status 40X (15)
Brute-Force
Web App Attack