Tamsy
2024-11-05 11:33:23
(6 days ago)
Web application vulnerability scanning
Web App Attack
TPI-Abuse
2024-10-24 12:18:43
(2 weeks ago)
(mod_security) mod_security (id:210730) triggered by 185.132.187.21 (-): 1 in the last 300 secs; Por ... show more (mod_security) mod_security (id:210730) triggered by 185.132.187.21 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Thu Oct 24 08:18:37.818746 2024] [security2:error] [pid 661:tid 661] [client 185.132.187.21:28799] [client 185.132.187.21] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||crypto-stamps.com|F|2"] [data ".sql"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "crypto-stamps.com"] [uri "/backups/dump.sql"] [unique_id "Zxo7HTfcgvIMczwT7WFwEAAAAAI"] show less
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
2024-10-14 23:20:04
(3 weeks ago)
| Suspicious URL access.
Hacking
SQL Injection
Web App Attack
Anonymous
2024-09-18 14:14:53
(1 month ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
Anonymous
2024-09-16 16:08:19
(1 month ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
cmbplf
2024-09-13 20:30:25
(1 month ago)
509 requests to */xmlrpc.php
Brute-Force
Bad Web Bot
Anonymous
2024-09-13 00:33:02
(1 month ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
TPI-Abuse
2024-09-04 20:35:16
(2 months ago)
(mod_security) mod_security (id:210492) triggered by 185.132.187.21 (-): 1 in the last 300 secs; Por ... show more (mod_security) mod_security (id:210492) triggered by 185.132.187.21 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Wed Sep 04 16:35:09.817511 2024] [security2:error] [pid 8115:tid 8115] [client 185.132.187.21:58781] [client 185.132.187.21] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "/sftp-config.json" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "tobyscott.com"] [uri "/backups/sftp-config.json"] [unique_id "ZtjEfdrrJygg2t8VCHg5_gAAAAs"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-08-24 21:14:00
(2 months ago)
(mod_security) mod_security (id:210730) triggered by 185.132.187.21 (-): 1 in the last 300 secs; Por ... show more (mod_security) mod_security (id:210730) triggered by 185.132.187.21 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Aug 24 17:13:52.070063 2024] [security2:error] [pid 18060:tid 18060] [client 185.132.187.21:9433] [client 185.132.187.21] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||bitcoinbtcshop.com|F|2"] [data ".sql"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "bitcoinbtcshop.com"] [uri "/bak/backup.sql"] [unique_id "ZspNECuDkadm4usmnS61JAAAAAs"] show less
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
2024-07-25 00:26:49
(3 months ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
TheMadBeaker
2024-07-23 21:17:29
(3 months ago)
Fail2Ban Ban Triggered
HTTP SQL Injection Attempt
Hacking
SQL Injection
MAGIC
2024-06-28 18:05:12
(4 months ago)
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot
TPI-Abuse
2024-06-24 13:21:28
(4 months ago)
(mod_security) mod_security (id:210730) triggered by 185.132.187.21 (-): 1 in the last 300 secs; Por ... show more (mod_security) mod_security (id:210730) triggered by 185.132.187.21 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Jun 24 09:21:21.461528 2024] [security2:error] [pid 22501] [client 185.132.187.21:37575] [client 185.132.187.21] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||ourhotmail.com|F|2"] [data ".sql"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "ourhotmail.com"] [uri "/backups/dump.sql"] [unique_id "Znly0di4jBOB4SAZIuVhywAAAAw"] show less
Brute-Force
Bad Web Bot
Web App Attack
hbrks
2024-06-07 18:37:23
(5 months ago)
HEAD http://techtronicgambia.com/backup/directory.rar
Web Spam
Hacking
Bad Web Bot
TPI-Abuse
2024-05-31 17:35:27
(5 months ago)
(mod_security) mod_security (id:210730) triggered by 185.132.187.21 (-): 1 in the last 300 secs; Por ... show more (mod_security) mod_security (id:210730) triggered by 185.132.187.21 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri May 31 13:35:23.645257 2024] [security2:error] [pid 8761] [client 185.132.187.21:60201] [client 185.132.187.21] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||swhowell.com|F|2"] [data ".sql"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "swhowell.com"] [uri "/backup/sql.sql"] [unique_id "ZloKWzetYh3kD-ez0FeVLQAAAAU"] show less
Brute-Force
Bad Web Bot
Web App Attack