oncord
2024-11-09 08:37:16
(4 weeks ago)
Form spam
Web Spam
Anonymous
2024-11-09 07:53:58
(4 weeks ago)
TACHIDE WEBFORM SPAM 212.102.33.72 (unn-212-102-33-72.cdn77.com)
Web Spam
oncord
2024-11-08 08:21:09
(1 month ago)
Form spam
Web Spam
TheMadBeaker
2024-11-02 05:36:59
(1 month ago)
Fail2Ban Ban Triggered
HTTP SQL Injection Attempt
Hacking
SQL Injection
hostseries
2024-10-22 19:22:34
(1 month ago)
Trigger: LF_DISTATTACK
Brute-Force
oncord
2024-10-14 01:42:06
(1 month ago)
Form spam
Web Spam
nyuuzyou
2024-10-07 06:15:30
(2 months ago)
Intensive scraping: /web?s=farm&country=uz-uz&scraper=ddg. User-Agent: Mozilla/5.0 (Windows NT 10.0; ... show more Intensive scraping: /web?s=farm&country=uz-uz&scraper=ddg. User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:114.0) Gecko/20100101 Firefox/114.0. show less
Bad Web Bot
TPI-Abuse
2024-09-12 17:35:30
(2 months ago)
(mod_security) mod_security (id:225170) triggered by 212.102.33.72 (unn-212-102-33-72.cdn77.com): 1 ... show more (mod_security) mod_security (id:225170) triggered by 212.102.33.72 (unn-212-102-33-72.cdn77.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Thu Sep 12 13:35:23.729092 2024] [security2:error] [pid 6346:tid 6346] [client 212.102.33.72:21436] [client 212.102.33.72] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.joelsarakula.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.joelsarakula.com"] [uri "/wp-json/wp/v2/users/"] [unique_id "ZuMmW9JvWAnu483PbyVcVgAAAA0"] show less
Brute-Force
Bad Web Bot
Web App Attack
nowyouknow
2024-08-16 22:04:12
(3 months ago)
(From [email protected] ) PawSafer™ Can Safely Trim Your Dog'S Nails In No Time From H ... show more (From [email protected] ) PawSafer™ Can Safely Trim Your Dog'S Nails In No Time From Home.
Get it while it's still 50% OFF + FREE Shipping
Buy here: https://pawsafer.net
Sincerely,
Leola show less
Phishing
Web Spam
oncord
2024-08-07 05:50:36
(4 months ago)
Form spam
Web Spam
TPI-Abuse
2024-08-06 21:02:59
(4 months ago)
(mod_security) mod_security (id:240335) triggered by 212.102.33.72 (unn-212-102-33-72.cdn77.com): 1 ... show more (mod_security) mod_security (id:240335) triggered by 212.102.33.72 (unn-212-102-33-72.cdn77.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Aug 06 17:02:53.008473 2024] [security2:error] [pid 11297:tid 11320] [client 212.102.33.72:8986] [client 212.102.33.72] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at IP. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "5956"] [id "240335"] [rev "5"] [msg "COMODO WAF: XML-RPC Attack Identified (CVE-2013-0235)|Source 212.102.33.72 (+1 hits since last alert)|plumeraproductions.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "plumeraproductions.com"] [uri "/xmlrpc.php"] [unique_id "ZrKPffmGDIT9IflnnuoFSwAAAJU"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-08-04 07:27:31
(4 months ago)
(mod_security) mod_security (id:225170) triggered by 212.102.33.72 (unn-212-102-33-72.cdn77.com): 1 ... show more (mod_security) mod_security (id:225170) triggered by 212.102.33.72 (unn-212-102-33-72.cdn77.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Aug 04 03:27:25.780475 2024] [security2:error] [pid 17664:tid 17664] [client 212.102.33.72:19377] [client 212.102.33.72] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||forgottenvictims.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "forgottenvictims.com"] [uri "/wp-json/wp/v2/users/"] [unique_id "Zq8tXRqWV-omSSH-zd9yfQAAAAI"] show less
Brute-Force
Bad Web Bot
Web App Attack
oncord
2024-07-29 08:33:24
(4 months ago)
Form spam
Web Spam
Anonymous
2024-07-29 08:19:52
(4 months ago)
Web Spam
TPI-Abuse
2024-07-28 09:08:06
(4 months ago)
(mod_security) mod_security (id:225170) triggered by 212.102.33.72 (unn-212-102-33-72.cdn77.com): 1 ... show more (mod_security) mod_security (id:225170) triggered by 212.102.33.72 (unn-212-102-33-72.cdn77.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Jul 28 05:07:58.746087 2024] [security2:error] [pid 6868:tid 6868] [client 212.102.33.72:22606] [client 212.102.33.72] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||scoutinsignia.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "scoutinsignia.com"] [uri "/wp-json/wp/v2/users/"] [unique_id "ZqYKbis1qhprWOAfHBhOigAAABw"] show less
Brute-Force
Bad Web Bot
Web App Attack