John Chrys.
05 Jul 2022
185.202.178.200 - - [05/Jul/2022:23:59:45 +0300] "POST /xmlrpc.php HTTP/1.1" 403 351 "-" "Mozilla/5. ... show more 185.202.178.200 - - [05/Jul/2022:23:59:45 +0300] "POST /xmlrpc.php HTTP/1.1" 403 351 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
... show less
Brute-Force
Web App Attack
iNetWorker
05 Jul 2022
trolling for resource vulnerabilities
Web App Attack
akac
04 Jul 2022
WordPress XML-RPC attack attempt.
Request: POST /wp/xmlrpc.php
User-Agent: Mozilla/5.0 ( ... show more WordPress XML-RPC attack attempt.
Request: POST /wp/xmlrpc.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
Body: <?xml version='1.0'?>
<methodCall>
<methodName>wp.getProfile</methodName>
<params>
<param><value><int>0</int></value></param>
<param><value><string><DOMAIN></string></value></param>
<param><value><string><DOMAIN>2022</string></value></param>
</params>
</methodCall> show less
Web Spam
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
01 Jul 2022
windhundgang.de 185.202.178.200 [01/Jul/2022:18:47:40 +0200] "POST /xmlrpc.php HTTP/1.1" 200 5878 "- ... show more windhundgang.de 185.202.178.200 [01/Jul/2022:18:47:40 +0200] "POST /xmlrpc.php HTTP/1.1" 200 5878 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
WINDHUNDGANG.DE 185.202.178.200 [01/Jul/2022:18:47:40 +0200] "POST /xmlrpc.php HTTP/1.1" 200 5878 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36" show less
Web App Attack
akac
30 Jun 2022
WordPress XML-RPC attack attempt.
Request: POST /wp/xmlrpc.php
User-Agent: Mozilla/5.0 ( ... show more WordPress XML-RPC attack attempt.
Request: POST /wp/xmlrpc.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
Body: <?xml version='1.0'?>
<methodCall>
<methodName>wp.getProfile</methodName>
<params>
<param><value><int>0</int></value></param>
<param><value><string><DOMAIN></string></value></param>
<param><value><string>qwerty12</string></value></param>
</params>
</methodCall> show less
Web Spam
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
27 Jun 2022
(mod_security) mod_security (id:972687) triggered by 185.202.178.200 (SE/Sweden/-): 2 in the last 36 ... show more (mod_security) mod_security (id:972687) triggered by 185.202.178.200 (SE/Sweden/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: [Mon Jun 27 14:40:15.394732 2022] [:error] [pid 4117014] [client 185.202.178.200:49086] [client 185.202.178.200] ModSecurity: Access denied with code 401 (phase 2). Operator EQ matched 0 at REQUEST_HEADERS. [file "/etc/apache2/conf.d/modsec/modsec2.user.conf"] [line "7"] [id "972687"] [msg "xmlrpc request blocked, no referrer"] [hostname "curitibasites.com"] [uri "/xmlrpc.php"] [unique_id "YrnrfzL865QWVPZvirEbyAAAAAo"]
[Mon Jun 27 14:40:15.402660 2022] [:error] [pid 4117003] [client 185.202.178.200:49088] [client 185.202.178.200] ModSecurity: Access denied with code 401 (phase 2). Operator EQ matched 0 at REQUEST_HEADERS. [file "/etc/apache2/conf.d/modsec/modsec2.user.conf"] [line "7"] [id "972687"] [msg "xmlrpc request blocked, no referrer"] [hostname "curitibasites.com"] [uri "/xmlrpc.php"] [unique_id "Yrnrf4Ww-kPdPG6qKWZmdgAAAAg"] show less
Port Scan
plzenskypruvodce.cz
26 Jun 2022
[Sun Jun 26 16:09:55.290802 2022] [access_compat:error] [pid 1739595:tid 140051878987520] [client 18 ... show more [Sun Jun 26 16:09:55.290802 2022] [access_compat:error] [pid 1739595:tid 140051878987520] [client 185.202.178.200:48486] AH01797: client denied by server configuration: /var/www/choteborky.cz/www/xmlrpc.php
[Sun Jun 26 16:09:55.316429 2022] [access_compat:error] [pid 1739595:tid 140051954521856] [client 185.202.178.200:48512] AH01797: client denied by server configuration: /var/www/choteborky.cz/www/xmlrpc.php
... show less
Web App Attack
Anonymous
24 Jun 2022
XMLRPC Hack Attempts
Hacking
Brute-Force
Ba-Yu
24 Jun 2022
WP-xmlrpc exploit
Web Spam
Blog Spam
Hacking
Exploited Host
Web App Attack
plzenskypruvodce.cz
21 Jun 2022
[Tue Jun 21 20:41:00.922311 2022] [access_compat:error] [pid 3887877:tid 140051862202112] [client 18 ... show more [Tue Jun 21 20:41:00.922311 2022] [access_compat:error] [pid 3887877:tid 140051862202112] [client 185.202.178.200:51568] AH01797: client denied by server configuration: /var/www/choteborky.cz/www/xmlrpc.php
[Tue Jun 21 20:41:00.923118 2022] [access_compat:error] [pid 3887877:tid 140051929343744] [client 185.202.178.200:51572] AH01797: client denied by server configuration: /var/www/choteborky.cz/www/xmlrpc.php
... show less
Web App Attack
taivas.nl
20 Jun 2022
Wordpress_xmlrpc_attack
Bad Web Bot
KIsmay
20 Jun 2022
WordPress Brute Force, 5 attempts
Brute-Force
Web App Attack
bittiguru.fi
18 Jun 2022
185.202.178.200 - [19/Jun/2022:06:53:42 +0300] "POST /xmlrpc.php HTTP/1.1" 200 428 "-" "Mozilla/5.0 ... show more 185.202.178.200 - [19/Jun/2022:06:53:42 +0300] "POST /xmlrpc.php HTTP/1.1" 200 428 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36" "-"
185.202.178.200 - [19/Jun/2022:06:53:42 +0300] "POST /xmlrpc.php HTTP/1.1" 200 428 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36" "-"
... show less
Hacking
Brute-Force
Web App Attack
Anonymous
16 Jun 2022
(mod_security) mod_security (id:972687) triggered by 185.202.178.200 (SE/Sweden/-): 2 in the last 36 ... show more (mod_security) mod_security (id:972687) triggered by 185.202.178.200 (SE/Sweden/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: [Thu Jun 16 04:28:52.043590 2022] [:error] [pid 3360373] [client 185.202.178.200:51678] [client 185.202.178.200] ModSecurity: Access denied with code 401 (phase 2). Operator EQ matched 0 at REQUEST_HEADERS. [file "/etc/apache2/conf.d/modsec/modsec2.user.conf"] [line "7"] [id "972687"] [msg "xmlrpc request blocked, no referrer"] [hostname "gatilsheroncats.com"] [uri "/xmlrpc.php"] [unique_id "YqrbtITVo19xH3J7CPBYDQAAAAc"]
[Thu Jun 16 04:28:52.065538 2022] [:error] [pid 3114450] [client 185.202.178.200:51680] [client 185.202.178.200] ModSecurity: Access denied with code 401 (phase 2). Operator EQ matched 0 at REQUEST_HEADERS. [file "/etc/apache2/conf.d/modsec/modsec2.user.conf"] [line "7"] [id "972687"] [msg "xmlrpc request blocked, no referrer"] [hostname "gatilsheroncats.com"] [uri "/xmlrpc.php"] [unique_id "YqrbtGNv1ugbywDlkM8sUwAAAAE"] show less
Port Scan
neverdown.eu
14 Jun 2022
(XMLRPC) WP XMLPRC Attack 185.202.178.200 (SE/Sweden/-): 1 in the last 3600 secs; Ports: *; Directio ... show more (XMLRPC) WP XMLPRC Attack 185.202.178.200 (SE/Sweden/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_CUSTOMTRIGGER; Logs: 185.202.178.200 - - [14/Jun/2022:09:06:20 +0300] "POST /xmlrpc.php HTTP/1.1" 301 707 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36" show less
Port Scan