BlueWire Hosting
2024-12-02 15:10:10
(6 days ago)
Probing for Wordpress vulnerabilities
Bad Web Bot
Web App Attack
bittiguru.fi
2024-11-26 21:15:03
(1 week ago)
WordPress brute force
Brute-Force
ifiguero
2024-11-26 07:29:35
(1 week ago)
Web Attack (WordPress search). 30m ban
Web App Attack
adnscom.net
2024-11-26 04:23:34
(1 week ago)
IPS trigger: Brute force WebApp/CMS scanning/attack
Brute-Force
Web App Attack
rellik
2024-11-19 08:26:00
(2 weeks ago)
Mass Admin Connection Attempt
Hacking
Brute-Force
Web App Attack
uhlhosting
2024-11-18 11:50:42
(2 weeks ago)
riesen-printmedia.ch 194.5.82.16 - - [18/Nov/2024:12:50:40.755780 +0100] "GET /.well-known/ HTTP/1.1 ... show more riesen-printmedia.ch 194.5.82.16 - - [18/Nov/2024:12:50:40.755780 +0100] "GET /.well-known/ HTTP/1.1" 403 199 "-" "-" ZzsqEFoqnCa8VUU7PqjcBAAAAAw "-" /apache/20241118/20241118-1250/20241118-125040-ZzsqEFoqnCa8VUU7PqjcBAAAAAw 0 1036 md5:4c6104df7018457dfade68556854112e
riesen-printmedia.ch 194.5.82.16 - - [18/Nov/2024:12:50:40.997457 +0100] "GET /ova.php HTTP/1.1" 403 199 "-" "-" ZzsqEFoqnCa8VUU7PqjcBQAAAAA "-" /apache/20241118/20241118-1250/20241118-125040-ZzsqEFoqnCa8VUU7PqjcBQAAAAA 0 1662 md5:aa098d018eafb434ecdbda9bd0b45d90
riesen-printmedia.ch 194.5.82.16 - - [18/Nov/2024:12:50:41.198049 +0100] "GET /wp-content/themes/sketch/404.php HTTP/1.1" 403 199 "-" "-" ZzsqEVoqnCa8VUU7PqjcBgAAABI "-" /apache/20241118/20241118-1250/20241118-125041-ZzsqEVoqnCa8VUU7PqjcBgAAABI 0 1712 md5:ef6b7456bcc4aab012fe460afedf78a4
riesen-printmedia.ch 194.5.82.16 - - [18/Nov/2024:12:50:41.371428 +0100] "GET /wp-admin/images/index.php HTTP/1.1" 403 199 "-" "-" ZzsqEVoqnCa8VUU7PqjcBwAAABA "-" /apache/2024
... show less
DDoS Attack
Brute-Force
myagent.site
2024-11-16 05:03:30
(3 weeks ago)
Blocking for trying to access an exploit file: /upload.php
Hacking
Roderic
2024-11-15 19:15:01
(3 weeks ago)
(apache_scanners-2) Failed apache-scanners trigger with match [redacted] from 194.5.82.16 (SG/Singap ... show more (apache_scanners-2) Failed apache-scanners trigger with match [redacted] from 194.5.82.16 (SG/Singapore/-) show less
Port Scan
myagent.site
2024-11-15 16:26:16
(3 weeks ago)
Blocking for trying to access an exploit file: /doc.php
Hacking
myagent.site
2024-11-15 15:32:17
(3 weeks ago)
Blocking for trying to access an exploit file: /login.php
Hacking
sweplox.se
2024-11-15 10:27:15
(3 weeks ago)
194.5.82.16 - - [15/Nov/2024:10:27:13 +0000] "GET /class.php HTTP/1.1" 301 162 "-" "Go-http-client/1 ... show more 194.5.82.16 - - [15/Nov/2024:10:27:13 +0000] "GET /class.php HTTP/1.1" 301 162 "-" "Go-http-client/1.1"
194.5.82.16 - - [15/Nov/2024:10:27:13 +0000] "GET /credits.php HTTP/1.1" 301 162 "-" "Go-http-client/1.1"
194.5.82.16 - - [15/Nov/2024:10:27:14 +0000] "GET /tiny.php HTTP/1.1" 301 162 "-" "Go-http-client/1.1"
194.5.82.16 - - [15/Nov/2024:10:27:14 +0000] "GET /wp-admin/classwithtostring.php HTTP/1.1" 301 162 "-" "Go-http-client/1.1"
194.5.82.16 - - [15/Nov/2024:10:27:15 +0000] "GET /assets/library.php HTTP/1.1" 301 162 "-" "Go-http-client/1.1"
194.5.82.16 - - [15/Nov/2024:10:27:15 +0000] "GET /wp-content/plugins/press/wp-class.php HTTP/1.1" 301 162 "-" "Go-http-client/1.1"
... show less
Bad Web Bot
SSH
Anonymous
2024-11-13 16:42:47
(3 weeks ago)
wordpress-trap
Web App Attack
Bächtold-Informatik
2024-11-13 09:39:27
(3 weeks ago)
Domain : nbyte.ch
Rule : vendorphp
2024-11-13 09:38:09 145.239.244.113 GET /about.php - ... show more Domain : nbyte.ch
Rule : vendorphp
2024-11-13 09:38:09 145.239.244.113 GET /about.php - 443 - 194.5.82.16 HTTP/2 Go-http-client/2.0 http://nbyte.ch/about.php nbyte.ch 404 0 2 12579 161 165 - - show less
Web App Attack
Apache
2024-11-13 07:17:05
(3 weeks ago)
(mod_security) mod_security (id:20000010) triggered by 194.5.82.16 (SG/Singapore/-): 5 in the last 3 ... show more (mod_security) mod_security (id:20000010) triggered by 194.5.82.16 (SG/Singapore/-): 5 in the last 300 secs show less
Brute-Force
Web App Attack
cmbplf
2024-11-12 23:07:59
(3 weeks ago)
2.021 requests from abuseipdb.com blacklisted IP (8mos1w3d)
Brute-Force
Bad Web Bot