Anonymous
2024-12-09 14:13:16
(1 month ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
Anonymous
2024-12-02 14:37:09
(1 month ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
TPI-Abuse
2024-11-16 16:36:03
(2 months ago)
(mod_security) mod_security (id:225170) triggered by 185.94.32.163 (-): 1 in the last 300 secs; Port ... show more (mod_security) mod_security (id:225170) triggered by 185.94.32.163 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 16 11:35:55.792600 2024] [security2:error] [pid 20979:tid 20979] [client 185.94.32.163:43149] [client 185.94.32.163] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||Palacio.org|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "palacio.org"] [uri "/wp-json/wp/v2/users"] [unique_id "ZzjJ60E7hdS4kf3sd2nu6QAAAAU"], referer: https://www.google.com show less
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
2024-11-16 10:01:37
(2 months ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
oncord
2024-11-02 22:18:30
(2 months ago)
Form spam
Web Spam
Anonymous
2024-10-26 23:51:06
(2 months ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
nowyouknow
2024-10-25 03:54:19
(2 months ago)
(From [email protected] ) Improving your website's performance and monitoring your marke ... show more (From [email protected] ) Improving your website's performance and monitoring your marketing efforts just got more straightforward! With our UTM Code Generator at SEOGEEK, you can:
Create custom tracking codes effortlessly to gain valuable insights into your digital marketing campaigns.
Know where your traffic comes from to refine your strategies effectively.
Measure the effectiveness of your campaigns with UTM codes, allowing for data-driven decisions that boost your marketing efforts.
If you're ready to get started, check out our resources:
## Quick tutorial video on using the UTM Code Generator: https://www.youtube.com/watch?v=LkZm0rtMrbM
++ Learn more about the importance of UTM codes for your campaigns: https://bit.ly/generateutm
Together, let’s take your digital marketing to the next level!
You can unsubscribe by filling the form with your website URL at https://bit.ly/unsubus
Schooldijk 40, Veenoord, Chandler , AZ, United States show less
Phishing
Web Spam
nowyouknow
2024-10-22 10:30:05
(2 months ago)
Phishing
Web Spam
Anonymous
2024-10-22 07:02:06
(2 months ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
oncord
2024-10-22 04:12:10
(2 months ago)
Form spam
Web Spam
Anonymous
2024-10-03 16:25:08
(3 months ago)
Automatic report - Vulnerability scan
/RDWeb/Pages/en-US/login.aspx
Web App Attack
TPI-Abuse
2024-05-05 16:12:49
(8 months ago)
(mod_security) mod_security (id:225170) triggered by 185.94.32.163 (-): 1 in the last 300 secs; Port ... show more (mod_security) mod_security (id:225170) triggered by 185.94.32.163 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun May 05 12:12:45.827960 2024] [security2:error] [pid 3288751] [client 185.94.32.163:36619] [client 185.94.32.163] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||1rod.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "1rod.com"] [uri "/wp-json/wp/v2/users"] [unique_id "Zjev_dpB9W2gP_nynVU8hQAAAA8"], referer: https://www.google.com show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-05-04 14:57:13
(8 months ago)
(mod_security) mod_security (id:225170) triggered by 185.94.32.163 (-): 1 in the last 300 secs; Port ... show more (mod_security) mod_security (id:225170) triggered by 185.94.32.163 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat May 04 10:57:07.995655 2024] [security2:error] [pid 21832] [client 185.94.32.163:51523] [client 185.94.32.163] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||khaoula.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "khaoula.com"] [uri "/wp-json/wp/v2/users"] [unique_id "ZjZMw7EwLXGUu15sJBZ4BwAAAAY"], referer: https://www.google.com show less
Brute-Force
Bad Web Bot
Web App Attack