Anonymous
3 hours ago
(mod_security) mod_security (id:972687) triggered by 212.129.57.194 (FR/France/stella.openema.net): ... show more (mod_security) mod_security (id:972687) triggered by 212.129.57.194 (FR/France/stella.openema.net): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: [Sat Feb 04 10:14:24.948653 2023] [:error] [pid 2253329] [client 212.129.57.194:39597] [client 212.129.57.194] ModSecurity: Access denied with code 401 (phase 2). Operator EQ matched 0 at REQUEST_HEADERS. [file "/etc/apache2/conf.d/modsec/modsec2.user.conf"] [line "7"] [id "972687"] [msg "xmlrpc request blocked, no referrer"] [hostname "vitakero.com.br"] [uri "/xmlrpc.php"] [unique_id "Y95aMG8TB4qqyCuBVPEp3AAAAAg"]
[Sat Feb 04 10:14:24.957799 2023] [:error] [pid 2255520] [client 212.129.57.194:39598] [client 212.129.57.194] ModSecurity: Access denied with code 401 (phase 2). Operator EQ matched 0 at REQUEST_HEADERS. [file "/etc/apache2/conf.d/modsec/modsec2.user.conf"] [line "7"] [id "972687"] [msg "xmlrpc request blocked, no referrer"] [hostname "vitakero.com.br"] [uri "/xmlrpc.php"] [unique_id "Y95aMGE5A7nuBK-V-4AwYQAAABM"] show less
Port Scan
bittiguru.fi
8 hours ago
212.129.57.194 - - \[04/Feb/2023:09:52:21 +0200\] "POST /WORDPRESS/xmlrpc.php HTTP/1.1" 404 564 "-" ... show more 212.129.57.194 - - \[04/Feb/2023:09:52:21 +0200\] "POST /WORDPRESS/xmlrpc.php HTTP/1.1" 404 564 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/60.0.3112.113 Safari/537.36" "-"
212.129.57.194 - - \[04/Feb/2023:09:52:22 +0200\] "POST /wordpress/xmlrpc.php HTTP/1.1" 200 428 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/60.0.3112.113 Safari/537.36" "-"
... show less
Hacking
Brute-Force
Web App Attack
Anonymous
31 Jan 2023
(mod_security) mod_security (id:972687) triggered by 212.129.57.194 (FR/France/stella.openema.net): ... show more (mod_security) mod_security (id:972687) triggered by 212.129.57.194 (FR/France/stella.openema.net): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: [Tue Jan 31 05:46:55.118934 2023] [:error] [pid 1037249] [client 212.129.57.194:46791] [client 212.129.57.194] ModSecurity: Access denied with code 401 (phase 2). Operator EQ matched 0 at REQUEST_HEADERS. [file "/etc/apache2/conf.d/modsec/modsec2.user.conf"] [line "7"] [id "972687"] [msg "xmlrpc request blocked, no referrer"] [hostname "ababas.com.br"] [uri "/xmlrpc.php"] [unique_id "Y9jVf5EdLnky1etG5K13bAAAAAQ"]
[Tue Jan 31 05:46:55.138838 2023] [:error] [pid 1038244] [client 212.129.57.194:46792] [client 212.129.57.194] ModSecurity: Access denied with code 401 (phase 2). Operator EQ matched 0 at REQUEST_HEADERS. [file "/etc/apache2/conf.d/modsec/modsec2.user.conf"] [line "7"] [id "972687"] [msg "xmlrpc request blocked, no referrer"] [hostname "ababas.com.br"] [uri "/xmlrpc.php"] [unique_id "Y9jVfyFZXS064j6zekvv0gAAAAY"] show less
Port Scan
ozisp.com.au
30 Jan 2023
FR_MNT-TISCALIFR_<33>1675104333 [119:28:1] (http_inspect) POST W/O CONTENT-LENGTH OR CHUNKS [Classif ... show more FR_MNT-TISCALIFR_<33>1675104333 [119:28:1] (http_inspect) POST W/O CONTENT-LENGTH OR CHUNKS [Classification: Unknown Traffic] [Priority: 3] {TCP} 203.176.121.200:80 show less
Hacking
SPYRA ROCKS
29 Jan 2023
none
Web App Attack
Anonymous
28 Jan 2023
FT-1848-BASKETBALL.DE 212.129.57.194 [28/Jan/2023:23:00:44 +0100] "POST /xmlrpc.php HTTP/1.1" 200 58 ... show more FT-1848-BASKETBALL.DE 212.129.57.194 [28/Jan/2023:23:00:44 +0100] "POST /xmlrpc.php HTTP/1.1" 200 580 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
ft-1848-basketball.de 212.129.57.194 [28/Jan/2023:23:00:44 +0100] "POST /xmlrpc.php HTTP/1.1" 200 580 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36" show less
Web App Attack
10dencehispahard SL
23 Jan 2023
Unauthorized login attempts [{'wordpress-xmlrpc'}]
Brute-Force
Web App Attack
Anonymous
23 Jan 2023
XMLRPC Hack Attempts
Hacking
Brute-Force
wnbhosting.dk
23 Jan 2023
WP xmlrpc [2023-01-23T01:17:04+01:00]
Hacking
Web App Attack
websase.com
21 Jan 2023
WordPress XMLRPC Brute Force Attacks
Brute-Force
Web App Attack
John Chrys.
20 Jan 2023
Brute-Force
Web App Attack
Anonymous
18 Jan 2023
(mod_security) mod_security (id:972687) triggered by 212.129.57.194 (FR/France/stella.openema.net): ... show more (mod_security) mod_security (id:972687) triggered by 212.129.57.194 (FR/France/stella.openema.net): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: [Tue Jan 17 23:31:26.925334 2023] [:error] [pid 728756] [client 212.129.57.194:56330] [client 212.129.57.194] ModSecurity: Access denied with code 401 (phase 2). Operator EQ matched 0 at REQUEST_HEADERS. [file "/etc/apache2/conf.d/modsec/modsec2.user.conf"] [line "7"] [id "972687"] [msg "xmlrpc request blocked, no referrer"] [hostname "iberobrasil.net"] [uri "/xmlrpc.php"] [unique_id "Y8dZ_oFoFXfHvziTqAdbsAAAAA8"]
[Tue Jan 17 23:31:26.927635 2023] [:error] [pid 742340] [client 212.129.57.194:56331] [client 212.129.57.194] ModSecurity: Access denied with code 401 (phase 2). Operator EQ matched 0 at REQUEST_HEADERS. [file "/etc/apache2/conf.d/modsec/modsec2.user.conf"] [line "7"] [id "972687"] [msg "xmlrpc request blocked, no referrer"] [hostname "iberobrasil.net"] [uri "/xmlrpc.php"] [unique_id "Y8dZ_lx4_XZBI8uMXxkhiwAAAAA"] show less
Port Scan
bittiguru.fi
24 Dec 2022
212.129.57.194 - [24/Dec/2022:23:16:28 +0200] "POST /xmlrpc.php HTTP/1.1" 301 178 "-" "Mozilla/5.0 ( ... show more 212.129.57.194 - [24/Dec/2022:23:16:28 +0200] "POST /xmlrpc.php HTTP/1.1" 301 178 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36" "-"
212.129.57.194 - [24/Dec/2022:23:16:29 +0200] "POST /xmlrpc.php HTTP/1.1" 403 1770 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36" "-"
... show less
Hacking
Brute-Force
Web App Attack
Anonymous
21 Dec 2022
XMLRPC Hack Attempts
Hacking
Brute-Force
Anonymous
21 Dec 2022
(mod_security) mod_security (id:972687) triggered by 212.129.57.194 (FR/France/stella.openema.net): ... show more (mod_security) mod_security (id:972687) triggered by 212.129.57.194 (FR/France/stella.openema.net): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: [Wed Dec 21 02:11:28.073728 2022] [:error] [pid 3044593] [client 212.129.57.194:38842] [client 212.129.57.194] ModSecurity: Access denied with code 401 (phase 2). Operator EQ matched 0 at REQUEST_HEADERS. [file "/etc/apache2/conf.d/modsec/modsec2.user.conf"] [line "7"] [id "972687"] [msg "xmlrpc request blocked, no referrer"] [hostname "geotur.com.br"] [uri "/xmlrpc.php"] [unique_id "Y6KVgLOwvq7IjfTexaNbCwAAAEg"]
[Wed Dec 21 02:11:28.074074 2022] [:error] [pid 3044576] [client 212.129.57.194:38841] [client 212.129.57.194] ModSecurity: Access denied with code 401 (phase 2). Operator EQ matched 0 at REQUEST_HEADERS. [file "/etc/apache2/conf.d/modsec/modsec2.user.conf"] [line "7"] [id "972687"] [msg "xmlrpc request blocked, no referrer"] [hostname "geotur.com.br"] [uri "/xmlrpc.php"] [unique_id "Y6KVgO-OWvQCJcbKIWkSWQAAADc"] show less
Port Scan