octageeks.com
|
|
Wordpress malicious attack:[octa404]
|
Web App Attack
|
|
polycoda
|
|
📄 Probes for wp-login.php and other inexistent URLs
|
Hacking
Web App Attack
|
|
Cloudkul Cloudkul
|
|
Multiple unauthorized attempts to access web resources
|
Brute-Force
Web App Attack
|
|
noise.agency
|
|
(wordpress) Failed wordpress login from 193.37.71.250 (RU/Russia/-)
|
Brute-Force
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 193.37.71.250 (vm718010.cloud.nuxt.network): 1 ... show more(mod_security) mod_security (id:225170) triggered by 193.37.71.250 (vm718010.cloud.nuxt.network): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Nov 05 07:51:15.414951 2024] [security2:error] [pid 32369:tid 32369] [client 193.37.71.250:52302] [client 193.37.71.250] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||coolerboxes.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "coolerboxes.com"] [uri "/wp-json/wp/v2/users"] [unique_id "ZyoUw-9xisL8fq0wnUR67wAAABE"], referer: https://www.google.com show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
cmbplf
|
|
1.278 POST requests to */wp-login.php
|
Brute-Force
Bad Web Bot
|
|
Jaime
|
|
This day 6 times ... Access forbidden - 403: - ... /?author=1
|
Brute-Force
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 193.37.71.250 (vm718010.cloud.nuxt.network): 1 ... show more(mod_security) mod_security (id:225170) triggered by 193.37.71.250 (vm718010.cloud.nuxt.network): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Nov 05 07:01:00.276539 2024] [security2:error] [pid 11419:tid 11419] [client 193.37.71.250:55786] [client 193.37.71.250] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||joeordie.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "joeordie.com"] [uri "/wp-json/wp/v2/users"] [unique_id "ZyoI_HMtXXoNds3hOG-EGgAAAA4"], referer: https://www.google.com show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 193.37.71.250 (vm718010.cloud.nuxt.network): 1 ... show more(mod_security) mod_security (id:225170) triggered by 193.37.71.250 (vm718010.cloud.nuxt.network): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Nov 05 06:28:58.010191 2024] [security2:error] [pid 792911:tid 792911] [client 193.37.71.250:53476] [client 193.37.71.250] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||versallis.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "versallis.com"] [uri "/wp-json/wp/v2/users"] [unique_id "ZyoBesgaqoXqtf8I5dbbSwAAAA4"], referer: https://www.google.com show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 193.37.71.250 (vm718010.cloud.nuxt.network): 1 ... show more(mod_security) mod_security (id:225170) triggered by 193.37.71.250 (vm718010.cloud.nuxt.network): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Nov 05 06:08:59.853979 2024] [security2:error] [pid 25339:tid 25339] [client 193.37.71.250:43378] [client 193.37.71.250] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||staben.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "staben.com"] [uri "/wp-json/wp/v2/users"] [unique_id "Zyn8y1Mz3QllmYEbggMi5wAAABM"], referer: https://www.google.com show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
maxxsense
|
|
(wordpress) Failed wordpress login from 193.37.71.250 (RU/Russia/vm718010.cloud.nuxt.network)
|
Brute-Force
|
|
FeG Deutschland
|
|
Looking for CMS/PHP/SQL vulnerablilities - 135
|
Exploited Host
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 193.37.71.250 (vm718010.cloud.nuxt.network): 1 ... show more(mod_security) mod_security (id:225170) triggered by 193.37.71.250 (vm718010.cloud.nuxt.network): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Nov 05 05:36:46.623573 2024] [security2:error] [pid 17815:tid 17815] [client 193.37.71.250:34100] [client 193.37.71.250] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||jolankagroup.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "jolankagroup.com"] [uri "/wp-json/wp/v2/users"] [unique_id "Zyn1Pv9xLh_nes3nw1zLoQAAAAA"], referer: https://www.google.com show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
Anonymous
|
|
apache-wordpress-login
|
Brute-Force
Web App Attack
|
|
Swiptly
|
|
WordPress xmlrpc spam or enumeration
...
|
Web Spam
Bad Web Bot
Web App Attack
|
|