oncord
2025-03-17 02:47:23
(3 days ago)
Form spam
Web Spam
thedreamer.nl
2025-03-16 23:27:45
(3 days ago)
185.100.87.139 - - [17/Mar/2025:00:27:39 +0100] "GET / HTTP/2.0" 403 107 "-" "Mozilla/5.0 (Windows N ... show more 185.100.87.139 - - [17/Mar/2025:00:27:39 +0100] "GET / HTTP/2.0" 403 107 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:128.0) Gecko/20100101 Firefox/128.0" "RO" "Bucharest" "44.42910" "26.10060"
185.100.87.139 - - [17/Mar/2025:00:27:40 +0100] "GET /favicon.ico HTTP/2.0" 403 107 "https://synapse.thedreamer.nl/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:128.0) Gecko/20100101 Firefox/128.0" "RO" "Bucharest" "44.42910" "26.10060"
185.100.87.139 - - [17/Mar/2025:00:27:44 +0100] "GET / HTTP/2.0" 403 107 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:128.0) Gecko/20100101 Firefox/128.0" "RO" "Bucharest" "44.42910" "26.10060"
185.100.87.139 - - [17/Mar/2025:00:27:45 +0100] "GET /favicon.ico HTTP/2.0" 403 107 "https://thedreamer.nl/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:128.0) Gecko/20100101 Firefox/128.0" "RO" "Bucharest" "44.42910" "26.10060"
... show less
Brute-Force
Bad Web Bot
oncord
2025-03-15 18:05:26
(4 days ago)
Form spam
Web Spam
Anonymous
2025-03-14 06:50:32
(6 days ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
librebit
2025-03-13 14:52:30
(6 days ago)
Brute force
Brute-Force
todix
2025-03-11 23:08:17
(1 week ago)
WebAttack or semilar from 185.100.87.139
Web App Attack
Ridwan Na'im
2025-03-10 02:16:14
(1 week ago)
Possible unauthorized access attempt to WordPress admin - Password Guessing
Hacking
Web App Attack
Psycho Solutions LLC
2025-03-09 18:29:08
(1 week ago)
Detected Wordpress Scanning. - Request Method: GET - Target: {PC} wp-login.php - User Agent: N ... show more Detected Wordpress Scanning. - Request Method: GET - Target: {PC} wp-login.php - User Agent: N/A - Timestamp: 3/9/2025 6:29 pm (UTC-6) show less
Web Spam
Hacking
Bad Web Bot
Web App Attack
ipblock.com
2025-03-09 17:05:00
(1 week ago)
IPBlock protected site ID [4055-d][s=02].
Major crawler impostor.
Mozilla/5.0 (compati ... show more IPBlock protected site ID [4055-d][s=02].
Major crawler impostor.
Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) show less
Bad Web Bot
oncord
2025-03-09 14:01:01
(1 week ago)
Form spam
Web Spam
ipblock.com
2025-03-09 03:53:00
(1 week ago)
IPBlock protected site ID [4055-d][s=02].
Major crawler impostor.
Mozilla/5.0 (compati ... show more IPBlock protected site ID [4055-d][s=02].
Major crawler impostor.
Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) show less
Bad Web Bot
subnetprotocol
2025-03-05 23:11:27
(2 weeks ago)
06/Mar/2025:00:11:24.584844 +0100Apache-Error: [file "apache2_util.c"] [line 275] [level 3] [client ... show more 06/Mar/2025:00:11:24.584844 +0100Apache-Error: [file "apache2_util.c"] [line 275] [level 3] [client 185.100.87.139] ModSecurity: Warning. Pattern match "(?i)(?:;|\\\\\\\\{|\\\\\\\\||\\\\\\\\|\\\\\\\\||&|&&|\\\\\\\\n|\\\\\\\\r|`)\\\\\\\\s*[\\\\\\\\(,@\\\\\\\\'\\\\"\\\\\\\\s]*(?:[\\\\\\\\w'\\\\"\\\\\\\\./]+/|[\\\\\\\\\\\\\\\\'\\\\"\\\\\\\\^]*\\\\\\\\w[\\\\\\\\\\\\\\\\'\\\\"\\\\\\\\^]*:.*\\\\\\\\\\\\\\\\|[\\\\\\\\^\\\\\\\\.\\\\\\\\w '\\\\"/\\\\\\\\\\\\\\\\]*\\\\\\\\\\\\\\\\)?[\\\\"\\\\\\\\^]*(?:s[\\\\"\\\\\\\\^]*(?:y[\\\\"\\\\\\\\^]*s[\\\\"\\\\\\\\^]*(?:t[\\\\"\\\\\\\\^]*e[\\\\"\\\\\\\\^]*m[\\\\"\\\\\\\\^]*(?:p[\\\\"\\\\\\\\^]*r[\\\\"\\\\\\\\^]*o[\\\\"\\\\\\\\^]*p[\\\\"\\\\\\\\^]*e ..." at ARGS:poids1. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf"] [line "295"] [id "932115"] [msg "Remote Command Execution: Windows Command Injection"] [data "Matched Data: ||(SELECT found within ARGS:poids1: ') AND 4834=CAST((CHR(113)||CHR(113)||CHR(1
... show less
Hacking
Web App Attack
subnetprotocol
2025-03-05 04:36:46
(2 weeks ago)
05/Mar/2025:05:36:43.546144 +0100Apache-Error: [file "apache2_util.c"] [line 275] [level 3] [client ... show more 05/Mar/2025:05:36:43.546144 +0100Apache-Error: [file "apache2_util.c"] [line 275] [level 3] [client 185.100.87.139] ModSecurity: Warning. Pattern match "(?:(?:\\\\\\\\(|\\\\\\\\[)[a-zA-Z0-9_.$\\\\"'\\\\\\\\[\\\\\\\\](){}/*\\\\\\\\s]+(?:\\\\\\\\)|\\\\\\\\])[0-9_.$\\\\"'\\\\\\\\[\\\\\\\\](){}/*\\\\\\\\s]*\\\\\\\\([a-zA-Z0-9_.$\\\\"'\\\\\\\\[\\\\\\\\](){}/*\\\\\\\\s].*\\\\\\\\)|\\\\\\\\([\\\\\\\\s]*string[\\\\\\\\s]*\\\\\\\\)[\\\\\\\\s]*(?:\\\\"|'))" at ARGS:taille1. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf"] [line "503"] [id "933210"] [msg "PHP Injection Attack: Variable Function Call Found"] [data "Matched Data: (SELECT (CHAR(113) CHAR(107) CHAR(118) CHAR(107) CHAR(113) (SELECT (CASE WHEN (7736=7736) THEN CHAR(49) ELSE CHAR(48) END)) CHAR(113) CHAR(106) CHAR(122) CHAR(112) CHAR(113))) found within ARGS:taille1: AND 7736 IN (SELECT (CHAR(113) CHAR(107) CHAR(118) CHAR(107) CHAR(113) (SELECT (CASE WHEN (7736=7736) THEN CHAR(49)
... show less
Hacking
Web App Attack
MAGIC
2025-03-02 01:01:33
(2 weeks ago)
VM5 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot
niceshops.com
2025-03-01 07:06:08
(2 weeks ago)
Web Attack (Mar 25 08:06:08 ScriptKiddie: request for /admin )
SQL Injection
Brute-Force
Bad Web Bot
Web App Attack