Anonymous
2024-12-08 19:48:09
(8 hours ago)
$f2bV_matches
Brute-Force
Abuse Reporting
2024-12-08 04:44:02
(23 hours ago)
Detected Wordpress Scanning. - Request Method: GET - Target: {PC} wp-login.php - User Agent: N ... show more Detected Wordpress Scanning. - Request Method: GET - Target: {PC} wp-login.php - User Agent: N/A - Timestamp: 12/8/2024 4:44 am (UTC-6) show less
Web Spam
Hacking
Bad Web Bot
Web App Attack
TPI-Abuse
2024-12-08 04:29:11
(23 hours ago)
(mod_security) mod_security (id:225170) triggered by 2001:1810:4181:120:0:4:42af:2c45 (Unknown): 1 i ... show more (mod_security) mod_security (id:225170) triggered by 2001:1810:4181:120:0:4:42af:2c45 (Unknown): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Dec 07 23:29:05.031787 2024] [security2:error] [pid 4602:tid 4602] [client 2001:1810:4181:120:0:4:42af:2c45:33316] [client 2001:1810:4181:120:0:4:42af:2c45] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||atidysort.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "atidysort.com"] [uri "/wp-json/wp/v2/users/"] [unique_id "Z1UgkaIzu5tOIJFOQ0WbJAAAAAY"] show less
Brute-Force
Bad Web Bot
Web App Attack
Hirte
2024-12-08 03:03:43
(1 day ago)
C1: Web Attack GET /wp-login.php
Web Spam
Hacking
Bad Web Bot
Web App Attack
TPI-Abuse
2024-12-08 01:50:45
(1 day ago)
(mod_security) mod_security (id:225170) triggered by 2001:1810:4181:120:0:4:42af:2c45 (Unknown): 1 i ... show more (mod_security) mod_security (id:225170) triggered by 2001:1810:4181:120:0:4:42af:2c45 (Unknown): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Dec 07 20:50:38.925866 2024] [security2:error] [pid 11034:tid 11034] [client 2001:1810:4181:120:0:4:42af:2c45:51428] [client 2001:1810:4181:120:0:4:42af:2c45] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||tcjohnston.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "tcjohnston.com"] [uri "/wp-json/wp/v2/users/"] [unique_id "Z1T7bvIzAp0VnsBPVWhIzgAAAAo"] show less
Brute-Force
Bad Web Bot
Web App Attack
ki3
2024-12-07 07:11:45
(1 day ago)
Fail2Ban: Web App Attacks and Forum Spam 2001:1810:4181:120:0:4:42af:2c45 1733555504.0(JST)
Web Spam
Bad Web Bot
Web App Attack
Anonymous
2024-12-06 03:39:27
(3 days ago)
2001:1810:4181:120:0:4:42af:2c45 - - [06/Dec/2024:03:39:26 +0000] "GET /wp-login.php HTTP/1.1" 404 1 ... show more 2001:1810:4181:120:0:4:42af:2c45 - - [06/Dec/2024:03:39:26 +0000] "GET /wp-login.php HTTP/1.1" 404 134 "-" "Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0"
... show less
Hacking
Web App Attack
TPI-Abuse
2024-12-06 01:07:40
(3 days ago)
(mod_security) mod_security (id:225170) triggered by 2001:1810:4181:120:0:4:42af:2c45 (Unknown): 1 i ... show more (mod_security) mod_security (id:225170) triggered by 2001:1810:4181:120:0:4:42af:2c45 (Unknown): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Thu Dec 05 20:07:36.781214 2024] [security2:error] [pid 31553:tid 31553] [client 2001:1810:4181:120:0:4:42af:2c45:53158] [client 2001:1810:4181:120:0:4:42af:2c45] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.exhaustthelimits.org|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.exhaustthelimits.org"] [uri "/wp-json/wp/v2/users/"] [unique_id "Z1JOWEjtWw0Xg8GWgjpnAQAAAAU"], referer: http://blog.chicdambach.com///wp-json/wp/v2/users/ show less
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
2024-12-05 20:52:54
(3 days ago)
$f2bV_matches
Brute-Force
Max la Menace
2024-12-05 16:35:33
(3 days ago)
Wordpress Attack (P)
Web App Attack
london2038.com
2024-12-05 10:54:02
(3 days ago)
Attacking WordPress
2001:1810:4181:120:0:4:42af:2c45 - - [05/Dec/2024:11:53:57 +0100] "POST /x ... show more Attacking WordPress
2001:1810:4181:120:0:4:42af:2c45 - - [05/Dec/2024:11:53:57 +0100] "POST /xmlrpc.php HTTP/1.1" 503 18966 "-" "Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:89.0) Gecko/20100101 Firefox/89.0" show less
Brute-Force
Web App Attack
Anonymous
2024-12-05 07:13:17
(3 days ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
TPI-Abuse
2024-11-26 15:34:00
(1 week ago)
(mod_security) mod_security (id:225170) triggered by 2001:1810:4181:120:0:4:42af:2c45 (Unknown): 1 i ... show more (mod_security) mod_security (id:225170) triggered by 2001:1810:4181:120:0:4:42af:2c45 (Unknown): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Nov 26 10:33:53.883074 2024] [security2:error] [pid 26455:tid 26455] [client 2001:1810:4181:120:0:4:42af:2c45:42046] [client 2001:1810:4181:120:0:4:42af:2c45] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||swcbsa.org|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "swcbsa.org"] [uri "/wp-json/wp/v2/users/"] [unique_id "Z0XqYYNKqMS44FD8Zhg2gQAAAAI"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-11-26 14:30:40
(1 week ago)
(mod_security) mod_security (id:225170) triggered by 2001:1810:4181:120:0:4:42af:2c45 (Unknown): 1 i ... show more (mod_security) mod_security (id:225170) triggered by 2001:1810:4181:120:0:4:42af:2c45 (Unknown): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Nov 26 09:30:34.814204 2024] [security2:error] [pid 1974196:tid 1974196] [client 2001:1810:4181:120:0:4:42af:2c45:59938] [client 2001:1810:4181:120:0:4:42af:2c45] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||jellisonrepair.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "jellisonrepair.com"] [uri "/wp-json/wp/v2/users/"] [unique_id "Z0XbirOZtaA4HOsq8NzSbQAAAAY"] show less
Brute-Force
Bad Web Bot
Web App Attack
LRob.fr
2024-11-26 12:45:08
(1 week ago)
WordPress login brute-force detected by Fail2Ban in plesk-wordpress jail
Brute-Force
Web App Attack