Mr-Money
2024-11-27 19:08:54
(1 month ago)
2/Nov/2024:06:51:01 +0100212.56.40.215 - - [27/Nov/2024:20:04:32 +0100] "GET /.env HTTP/1.1" 404 493 ... show more 2/Nov/2024:06:51:01 +0100212.56.40.215 - - [27/Nov/2024:20:04:32 +0100] "GET /.env HTTP/1.1" 404 493 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0"
2/Nov/2024:06:51:01 +0100212.56.40.215 - - [27/Nov/2024:20:08:27 +0100] "GET /recht-pflicht/rechtsschutzversicherung.env HTTP/1.1" 404 120447 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0"
2/Nov/2024:06:51:01 +0100212.56.40.215 - - [27/Nov/2024:20:08:53 +0100] "GET /.env HTTP/1.1" 404 493 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0"
... show less
Hacking
SQL Injection
Bad Web Bot
Exploited Host
Web App Attack
el-brujo
2024-11-27 16:48:46
(1 month ago)
27/Nov/2024:17:48:45.653320 +0100Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client ... show more 27/Nov/2024:17:48:45.653320 +0100Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client 212.56.40.215] ModSecurity: Warning. Matched phrase "/.env" at REQUEST_FILENAME. [file "/etc/httpd/modsecurity.d/activated_rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "125"] [id "930130"] [msg "Restricted File Access Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.5"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/255/153/126"] [tag "PCI/6.5.4"] [hostname "hostench.eu"] [uri "/.env"] [unique_id "Z0dNbRnnjiBKGXRhTXeKsAAFTwY"]
... show less
Hacking
Web App Attack
el-brujo
2024-11-27 10:00:13
(1 month ago)
27/Nov/2024:11:00:13.505716 +0100Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client ... show more 27/Nov/2024:11:00:13.505716 +0100Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client 212.56.40.215] ModSecurity: Warning. Matched phrase "/.env" at REQUEST_FILENAME. [file "/etc/httpd/modsecurity.d/activated_rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "125"] [id "930130"] [msg "Restricted File Access Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.5"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/255/153/126"] [tag "PCI/6.5.4"] [hostname "hostench.eu"] [uri "/.env"] [unique_id "Z0btrZAiJ5FgdqkIpw1-3AAAFRI"]
... show less
Hacking
Web App Attack
el-brujo
2024-11-27 08:53:17
(1 month ago)
27/Nov/2024:09:53:17.370532 +0100Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client ... show more 27/Nov/2024:09:53:17.370532 +0100Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client 212.56.40.215] ModSecurity: Warning. Matched phrase "/.env" at REQUEST_FILENAME. [file "/etc/httpd/modsecurity.d/activated_rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "125"] [id "930130"] [msg "Restricted File Access Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.5"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/255/153/126"] [tag "PCI/6.5.4"] [hostname "hostench.eu"] [uri "/.env"] [unique_id "Z0bd_QZxkXvCWc70ta_B_gACThg"]
... show less
Hacking
Web App Attack
Anonymous
2024-11-27 05:55:32
(1 month ago)
Bot / scanning and/or hacking attempts: GET /.env HTTP/1.1
Hacking
Web App Attack
teamsecure
2024-11-27 05:54:47
(1 month ago)
Banned for trying to access env
Web App Attack
Anonymous
2024-11-27 05:46:17
(1 month ago)
Infected user bad webscan
Exploited Host
el-brujo
2024-11-27 01:51:46
(1 month ago)
27/Nov/2024:02:51:46.283053 +0100Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client ... show more 27/Nov/2024:02:51:46.283053 +0100Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client 212.56.40.215] ModSecurity: Warning. Matched phrase "/.env" at REQUEST_FILENAME. [file "/etc/httpd/modsecurity.d/activated_rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "125"] [id "930130"] [msg "Restricted File Access Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.5"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/255/153/126"] [tag "PCI/6.5.4"] [hostname "hostench.eu"] [uri "/.env"] [unique_id "Z0Z7MmGQUDai4kxftNj_cwACGiE"]
... show less
Hacking
Web App Attack
Anonymous
2024-11-26 15:55:11
(1 month ago)
SuspiciousC2 Activity detected by FMBAD System 2024-11-26 18:55:11
Hacking
Bad Web Bot
Web App Attack
lindi
2024-11-26 15:44:10
(1 month ago)
trying to access .env file
...
Hacking
Web App Attack
el-brujo
2024-11-26 14:26:17
(1 month ago)
26/Nov/2024:15:26:16.425136 +0100Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client ... show more 26/Nov/2024:15:26:16.425136 +0100Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client 212.56.40.215] ModSecurity: Warning. Matched phrase "/.env" at REQUEST_FILENAME. [file "/etc/httpd/modsecurity.d/activated_rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "125"] [id "930130"] [msg "Restricted File Access Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.5"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/255/153/126"] [tag "PCI/6.5.4"] [hostname "hostench.eu"] [uri "/.env"] [unique_id "Z0XaiJtnamGaIakOBnqJdgAAbwQ"]
... show less
Hacking
Web App Attack
el-brujo
2024-11-26 01:19:49
(2 months ago)
26/Nov/2024:02:19:49.721897 +0100Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client ... show more 26/Nov/2024:02:19:49.721897 +0100Apache-Error: [file "apache2_util.c"] [line 271] [level 3] [client 212.56.40.215] ModSecurity: Warning. Matched phrase "/.env" at REQUEST_FILENAME. [file "/etc/httpd/modsecurity.d/activated_rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "125"] [id "930130"] [msg "Restricted File Access Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.5"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/255/153/126"] [tag "PCI/6.5.4"] [hostname "hostench.eu"] [uri "/.env"] [unique_id "Z0UiNZtnamGaIakOBnoKSwAAbDw"]
... show less
Hacking
Web App Attack
Anonymous
2024-11-26 00:48:05
(2 months ago)
Infected user bad webscan
Exploited Host
teamsecure
2024-11-25 23:57:54
(2 months ago)
Banned for trying to access env
Web App Attack
Hydra-Shield.fr
2024-11-25 22:12:22
(2 months ago)
Directory Traversal on: /.env
Web App Attack