MAGIC
|
|
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
|
DDoS Attack
Bad Web Bot
|
|
theEngineer
|
|
[10:47:44] 11: Scanning for Exploits - /wp-login.php
|
Hacking
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 175.38.0.99 (n175-38-0-99.meb1.vic.optusnet.com ... show more(mod_security) mod_security (id:225170) triggered by 175.38.0.99 (n175-38-0-99.meb1.vic.optusnet.com.au): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Wed Aug 21 12:36:28.641719 2024] [security2:error] [pid 19597:tid 19597] [client 175.38.0.99:64209] [client 175.38.0.99] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.ideaofauniversity.website|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.ideaofauniversity.website"] [uri "/wp-json/wp/v2/users/1"] [unique_id "ZsYXjGP-fQxkRzd9izPD8AAAAA4"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
Anonymous
|
|
Brute forcing Wordpress login
|
Hacking
Web App Attack
|
|
MAGIC
|
|
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
|
DDoS Attack
Bad Web Bot
|
|
MAGIC
|
|
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
|
DDoS Attack
Bad Web Bot
|
|
URAN Publishing Service
|
|
175.38.0.99 - - [15/Jun/2024:18:49:46 +0300] "GET /wp-login.php HTTP/1.1" 404 2971 "-" "Mozilla/5.0 ... show more175.38.0.99 - - [15/Jun/2024:18:49:46 +0300] "GET /wp-login.php HTTP/1.1" 404 2971 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
175.38.0.99 - - [15/Jun/2024:18:49:47 +0300] "GET /xmlrpc.php HTTP/1.1" 404 366 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
... show less
|
Web App Attack
Web App Attack
|
|
MAGIC
|
|
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
|
DDoS Attack
DDoS Attack
Bad Web Bot
Bad Web Bot
|
|
Anonymous
|
|
Malicious activity detected
|
Hacking
Hacking
Web App Attack
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 175.38.0.99 (n175-38-0-99.meb1.vic.optusnet.com ... show more(mod_security) mod_security (id:225170) triggered by 175.38.0.99 (n175-38-0-99.meb1.vic.optusnet.com.au): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Jun 09 04:01:43.668045 2024] [security2:error] [pid 13119] [client 175.38.0.99:64632] [client 175.38.0.99] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.jillbauman.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.jillbauman.com"] [uri "/wp-json/wp/v2/users/1"] [unique_id "ZmVhZx88M1zpHgkfziWZ5gAAABY"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
URAN Publishing Service
|
|
175.38.0.99 - - [29/May/2024:15:38:35 +0300] "GET /wp-login.php HTTP/1.1" 404 2972 "-" "Mozilla/5.0 ... show more175.38.0.99 - - [29/May/2024:15:38:35 +0300] "GET /wp-login.php HTTP/1.1" 404 2972 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
175.38.0.99 - - [29/May/2024:15:38:37 +0300] "GET /xmlrpc.php HTTP/1.1" 404 366 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
... show less
|
Web App Attack
|
|