niceshops.com
2024-12-30 14:33:31
(2 weeks ago)
Web Attack multi (Dec 24 15:33:31 Matching rules: Detect possible SQL injection - Too many SQL keyw ... show more Web Attack multi (Dec 24 15:33:31 Matching rules: Detect possible SQL injection - Too many SQL keywords (more than 3 times),Detect possible SQL injection - E.g. Sleep(5),Detect possible SQL injection - E.g. Select * from ) show less
SQL Injection
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
2024-12-24 03:19:39
(3 weeks ago)
Action: Block, Reason: DDOS attack detected
DDoS Attack
TPI-Abuse
2024-12-16 12:08:56
(1 month ago)
(mod_security) mod_security (id:210492) triggered by 173.44.141.34 (-): 1 in the last 300 secs; Port ... show more (mod_security) mod_security (id:210492) triggered by 173.44.141.34 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Dec 16 07:08:49.285918 2024] [security2:error] [pid 5445:tid 5445] [client 173.44.141.34:42496] [client 173.44.141.34] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "wp-config.php" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "hoofnwoofusa.com"] [uri "/wp-config.php9"] [unique_id "Z2AYUVJPr_zlksNq635EhQAAAAo"] show less
Brute-Force
Bad Web Bot
Web App Attack
oncord
2024-12-11 12:16:01
(1 month ago)
Form spam
Web Spam
canine.tools
2024-12-10 12:32:17
(1 month ago)
[fail2ban Auto Report] searxng search spam abuse
Port Scan
Brute-Force
TPI-Abuse
2024-12-09 18:28:18
(1 month ago)
(mod_security) mod_security (id:210492) triggered by 173.44.141.34 (-): 1 in the last 300 secs; Port ... show more (mod_security) mod_security (id:210492) triggered by 173.44.141.34 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Dec 09 13:28:12.704838 2024] [security2:error] [pid 3937037:tid 3937037] [client 173.44.141.34:49228] [client 173.44.141.34] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "wp-config.php" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "telecompros.net"] [uri "/wp-config.php_"] [unique_id "Z1c2vFveYagQz3R8fdCJqAAAABo"] show less
Brute-Force
Bad Web Bot
Web App Attack
canine.tools
2024-12-04 13:15:00
(1 month ago)
[fail2ban Auto Report] searxng search spam abuse
Port Scan
Brute-Force
TPI-Abuse
2024-12-04 12:48:18
(1 month ago)
(mod_security) mod_security (id:210492) triggered by 173.44.141.34 (-): 1 in the last 300 secs; Port ... show more (mod_security) mod_security (id:210492) triggered by 173.44.141.34 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Wed Dec 04 07:48:10.477876 2024] [security2:error] [pid 23608:tid 23608] [client 173.44.141.34:35882] [client 173.44.141.34] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "wp-config.php" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "artbytracyjane.com"] [uri "/wp-config.php_new2017"] [unique_id "Z1BPiu1AlG5H-UoIPELRuwAAAAo"] show less
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
2024-12-04 03:41:39
(1 month ago)
Action: Block, Reason: DDOS attack detected
DDoS Attack
canine.tools
2024-11-26 01:27:28
(1 month ago)
[fail2ban Auto Report] searxng search spam abuse
Port Scan
Brute-Force
Anonymous
2024-10-22 08:45:44
(2 months ago)
Action: Block, Reason: DDOS attack detected
DDoS Attack
Tonga-Soa
2024-10-21 22:38:05
(2 months ago)
"Inject SQL SELECT ... union select..."
Hacking
SQL Injection
mnsf
2024-10-21 16:01:10
(2 months ago)
Login Too Frequent (15)
Brute-Force
Web App Attack
TPI-Abuse
2024-10-14 13:13:04
(3 months ago)
(mod_security) mod_security (id:210492) triggered by 173.44.141.34 (-): 1 in the last 300 secs; Port ... show more (mod_security) mod_security (id:210492) triggered by 173.44.141.34 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Oct 14 09:12:58.666179 2024] [security2:error] [pid 27716:tid 27716] [client 173.44.141.34:48056] [client 173.44.141.34] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "/.git/" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "www.mail.emelecsrl.com"] [uri "/.git/config"] [unique_id "Zw0Y2jMt2ImQ7p6OCer-SAAAAAA"] show less
Brute-Force
Bad Web Bot
Web App Attack
NyaljBe
2024-10-08 02:49:00
(3 months ago)
heavy wp-login.php & xmlrpc.php attack
Web App Attack