axllent
2024-09-07 04:12:01
(1 day ago)
Wordpress login scanning
Brute-Force
Web App Attack
Anonymous
2024-09-03 00:36:20
(5 days ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
TPI-Abuse
2024-08-30 15:36:18
(1 week ago)
(mod_security) mod_security (id:225170) triggered by 200.125.160.74 (cuscon160074.amplia.co.tt): 1 i ... show more (mod_security) mod_security (id:225170) triggered by 200.125.160.74 (cuscon160074.amplia.co.tt): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri Aug 30 11:36:11.123262 2024] [security2:error] [pid 16279:tid 16279] [client 200.125.160.74:59530] [client 200.125.160.74] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||modmove.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "modmove.com"] [uri "/wp-json/wp/v2/users/1"] [unique_id "ZtHm66CeQypg5mTMefvYGQAAAAM"] show less
Brute-Force
Bad Web Bot
Web App Attack
MAGIC
2024-08-27 18:03:57
(1 week ago)
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot
TPI-Abuse
2024-08-23 21:11:50
(2 weeks ago)
(mod_security) mod_security (id:225170) triggered by 200.125.160.74 (cuscon160074.amplia.co.tt): 1 i ... show more (mod_security) mod_security (id:225170) triggered by 200.125.160.74 (cuscon160074.amplia.co.tt): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri Aug 23 17:11:43.756696 2024] [security2:error] [pid 3744:tid 3766] [client 200.125.160.74:54353] [client 200.125.160.74] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||kettlehill.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "kettlehill.com"] [uri "/wp-json/wp/v2/users/1"] [unique_id "Zsj7D2Z9fUxEOeegOAmH9wAAAAo"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-08-15 19:34:36
(3 weeks ago)
(mod_security) mod_security (id:225170) triggered by 200.125.160.74 (cuscon160074.amplia.co.tt): 1 i ... show more (mod_security) mod_security (id:225170) triggered by 200.125.160.74 (cuscon160074.amplia.co.tt): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Thu Aug 15 15:34:26.702337 2024] [security2:error] [pid 392645:tid 392656] [client 200.125.160.74:57681] [client 200.125.160.74] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||whatismetamodern.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "whatismetamodern.com"] [uri "/wp-json/wp/v2/users/1"] [unique_id "Zr5YQoO6t07uwTHFJTywlgAAAMk"] show less
Brute-Force
Bad Web Bot
Web App Attack
Hirte
2024-08-12 19:48:47
(3 weeks ago)
DIS: Web Attack GET /wp-login.php
Web Spam
Hacking
Bad Web Bot
Web App Attack
Anonymous
2024-08-11 13:54:04
(4 weeks ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
winscoreonline.com
2024-08-09 16:08:09
(4 weeks ago)
Port Scan
TPI-Abuse
2024-07-25 20:52:18
(1 month ago)
(mod_security) mod_security (id:225170) triggered by 200.125.160.74 (cuscon160074.amplia.co.tt): 1 i ... show more (mod_security) mod_security (id:225170) triggered by 200.125.160.74 (cuscon160074.amplia.co.tt): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Thu Jul 25 16:52:11.624100 2024] [security2:error] [pid 3537:tid 3537] [client 200.125.160.74:60364] [client 200.125.160.74] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.wild-goose.net|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.wild-goose.net"] [uri "/wp-json/wp/v2/users/1"] [unique_id "ZqK6-99MmfoajALXdvVDHAAAAAQ"] show less
Brute-Force
Bad Web Bot
Web App Attack
rdpguard.com
2024-07-24 17:16:09
(1 month ago)
RdpGuard detected brute-force attempt on HTTP
Brute-Force
MAGIC
2024-07-17 11:08:56
(1 month ago)
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot
Roderic
2024-07-15 22:45:19
(1 month ago)
(apache_scanners-2) Failed apache-scanners trigger with match [redacted] from 200.125.160.74 (TT/Tri ... show more (apache_scanners-2) Failed apache-scanners trigger with match [redacted] from 200.125.160.74 (TT/Trinidad and Tobago/cuscon160074.amplia.co.tt) show less
Port Scan
axllent
2024-07-03 21:57:21
(2 months ago)
Wordpress login scanning
Brute-Force
Web App Attack
Linuxmalwarehuntingnl
2024-07-03 08:55:15
(2 months ago)
Unauthorized connection attempt
Brute-Force