rakkor
03 May 2022
2022/03/06 17:55:09 [error] 25112#25112: *49765 FastCGI sent in stderr: "Primary script unknown" whi ... show more 2022/03/06 17:55:09 [error] 25112#25112: *49765 FastCGI sent in stderr: "Primary script unknown" while reading response header from upstream, client: 208.109.68.114, server: , request: "GET /wp-login.php HTTP/1.1", upstream: "fastcgi://unix:/run/php-fpm/php-fdf1d4a0-1ee6-4ddf-8a4a-bf7184d3fc60.sock:", host: "nas.rakkor.uk" show less
Brute-Force
Web App Attack
ipcop.net
24 Apr 2022
2022/04/06 21:08:31 [error] 2234834#2234834: *1852700 open() "/usr/share/nginx/html/wp-login.php" fa ... show more 2022/04/06 21:08:31 [error] 2234834#2234834: *1852700 open() "/usr/share/nginx/html/wp-login.php" failed (2: No such file or directory), client: 208.109.68.114, server: _, request: "GET /wp-login.php HTTP/1.1", host: "freifunk-remscheid.de", referrer: "http://freifunk-remscheid.de/wp-login.php"
2022/04/06 21:13:49 [error] 2234836#2234836: *1853521 open() "/usr/share/nginx/html/wp-login.php" failed (2: No such file or directory), client: 208.109.68.114, server: _, request: "GET /wp-login.php HTTP/1.1", host: "morpheus01.prj.intocode.net", referrer: "http://morpheus01.prj.intocode.net/wp-login.php" show less
Fraud VoIP
Brute-Force
ipcop.net
24 Apr 2022
2022/04/06 21:08:31 [error] 2234834#2234834: *1852700 open() "/usr/share/nginx/html/wp-login.php" fa ... show more 2022/04/06 21:08:31 [error] 2234834#2234834: *1852700 open() "/usr/share/nginx/html/wp-login.php" failed (2: No such file or directory), client: 208.109.68.114, server: _, request: "GET /wp-login.php HTTP/1.1", host: "freifunk-remscheid.de", referrer: "http://freifunk-remscheid.de/wp-login.php"
2022/04/06 21:13:49 [error] 2234836#2234836: *1853521 open() "/usr/share/nginx/html/wp-login.php" failed (2: No such file or directory), client: 208.109.68.114, server: _, request: "GET /wp-login.php HTTP/1.1", host: "morpheus01.prj.intocode.net", referrer: "http://morpheus01.prj.intocode.net/wp-login.php" show less
Fraud VoIP
Brute-Force
23.de
22 Apr 2022
Brute force Wordpress attack
Brute-Force
Web App Attack
websase.com
08 Apr 2022
WordPress XMLRPC Brute Force Attacks
Brute-Force
Web App Attack
Ba-Yu
07 Apr 2022
WP-xmlrpc exploit
Web Spam
Blog Spam
Hacking
Exploited Host
Web App Attack
Jim Keir
07 Apr 2022
2022-04-07 06:13:54 208.109.68.114 File scanning, blocking 208.109.68.114 for 5 minutes
Web App Attack
Kraften
06 Apr 2022
Web noscript attack
...
Web Spam
Web App Attack
vestibtech
06 Apr 2022
208.109.68.114 - - [06/Apr/2022:15:25:59 -0600] "GET /wp-login.php HTTP/1.1" 301 480 "-" "Mozilla/5. ... show more 208.109.68.114 - - [06/Apr/2022:15:25:59 -0600] "GET /wp-login.php HTTP/1.1" 301 480 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
... show less
Web App Attack
Guardian
06 Apr 2022
Scanning for installed WordPress and vulnerabilities
208.109.68.114 [06/Apr/2022:18:08:39] "GE ... show more Scanning for installed WordPress and vulnerabilities
208.109.68.114 [06/Apr/2022:18:08:39] "GET /wp-login.php HTTP/1.1" show less
Port Scan
Web App Attack
Anymous
06 Apr 2022
GET /wp-login.php HTTP/1.1 404 4870 "-/wp-login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62. ... show more GET /wp-login.php HTTP/1.1 404 4870 "-/wp-login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" show less
Port Scan
Web App Attack
EricThi
05 Apr 2022
2022/04/05 20:57:55 [error] 3711659#3711659: *22508529 open() "/usr/share/nginx/html/eric.ovh/wp-log ... show more 2022/04/05 20:57:55 [error] 3711659#3711659: *22508529 open() "/usr/share/nginx/html/eric.ovh/wp-login.php" failed (2: No such file or directory), client: 208.109.68.114, server: eric.ovh, request: "GET /wp-login.php HTTP/1.1", host: "peertube.eric.ovh", referrer: "http://peertube.eric.ovh/wp-login.php"
208.109.68.114 - - [05/Apr/2022:20:57:55 +0200] "GET /wp-login.php HTTP/1.1" 404 117 "http://peertube.eric.ovh/wp-login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
... show less
Web Spam
Port Scan
Brute-Force
Exploited Host
GeekOnTheHill
05 Apr 2022
GET /wp-login.php HTTP/1.1
Hacking
Web App Attack
Anonymous
05 Apr 2022
208.109.68.114 - - [04/Apr/2022:13:12:05 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4970 "-" "Mozilla/5. ... show more 208.109.68.114 - - [04/Apr/2022:13:12:05 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4970 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
208.109.68.114 - - [04/Apr/2022:16:56:00 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4970 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
208.109.68.114 - - [05/Apr/2022:12:00:36 +0200] "POST /xmlrpc.php HTTP/1.1" 403 6238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
... show less
Brute-Force
Web App Attack
plzenskypruvodce.cz
04 Apr 2022
[Mon Apr 04 22:23:37.817491 2022] [access_compat:error] [pid 2473565:tid 140511037802240] [client 20 ... show more [Mon Apr 04 22:23:37.817491 2022] [access_compat:error] [pid 2473565:tid 140511037802240] [client 208.109.68.114:54714] AH01797: client denied by server configuration: /var/www/vzkrisenevarhany.cz/www/xmlrpc.php
[Mon Apr 04 22:23:44.510386 2022] [access_compat:error] [pid 2473565:tid 140511088158464] [client 208.109.68.114:56450] AH01797: client denied by server configuration: /var/www/buchtic.net/blog/xmlrpc.php
... show less
Web App Attack