Ba-Yu
|
|
General hacking/exploits/scanning
|
Web Spam
Hacking
Brute-Force
Exploited Host
Web App Attack
|
|
hermawan
|
|
[Tue Sep 24 09:44:53.575209 2024] [security2:error] [pid 39887:tid 134238198302400] [client 36.110.1 ... show more[Tue Sep 24 09:44:53.575209 2024] [security2:error] [pid 39887:tid 134238198302400] [client 36.110.131.14:13303] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "Head" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/coreruleset-4.5.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "39"] [id "440000"] [msg "BAD BOT - Detected and Blocked"] [data "Matched Data: Head found within REQUEST_HEADERS:User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/117.0.5938.60 Safari/537.36 request_line = GET /TableFilter/system-v167.css HTTP/2.0"] [severity "NOTICE"] [hostname "staklim-malang.info"] [uri "/TableFilter/system-v167.css"] [unique_id "ZvInpS-0Zj7hE76V4cjjqwABiQY"], referer https://staklim-malang.info/index.php/profil/arsip-artikel?id=618&start=60 [staklim-malang.info] [staklim-malang.info] top=[39894] [h8dwfVQO2vI] [ZvInpS-0Zj7hE76V4cjjqwABiQY] keep_alive=[1] [2024-09-24 09:44:53.575221] [R:ZvInpS-0Zj7hE76V4cjjqwABiQ
... show less
|
Hacking
Web App Attack
|
|
hermawan
|
|
[Tue Sep 17 20:15:47.529466 2024] [security2:error] [pid 219699:tid 138908125890240] [client 36.110. ... show more[Tue Sep 17 20:15:47.529466 2024] [security2:error] [pid 219699:tid 138908125890240] [client 36.110.131.14:2753] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "Head" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/coreruleset-4.5.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "39"] [id "440000"] [msg "BAD BOT - Detected and Blocked"] [data "Matched Data: Head found within REQUEST_HEADERS:User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/117.0.5938.60 Safari/537.36 request_line = GET /TableFilter/system-v167.css HTTP/2.0"] [severity "NOTICE"] [hostname "staklim-malang.info"] [uri "/TableFilter/system-v167.css"] [unique_id "ZumBAyWxOt_N_8gOAGkLhgAAyQo"], referer https://staklim-malang.info/index.php/profil/arsip-artikel?catid=473&id=517%3Aprakiraan-cuaca-daerah-malang-dan-batu-seminggu-ke-depan-berlaku-tanggal-28-april-4-mei-2015&start=30 [staklim-malang.info] [staklim-malang.info] top=[219710] [k0jSfBAC5b
... show less
|
Hacking
Web App Attack
|
|
hermawan
|
|
[Wed Sep 11 22:45:31.917291 2024] [security2:error] [pid 48512:tid 136163541124800] [client 36.110.1 ... show more[Wed Sep 11 22:45:31.917291 2024] [security2:error] [pid 48512:tid 136163541124800] [client 36.110.131.14:46886] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "Head" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/coreruleset-4.5.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "39"] [id "440000"] [msg "BAD BOT - Detected and Blocked"] [data "Matched Data: Head found within REQUEST_HEADERS:User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/117.0.5938.60 Safari/537.36 request_line = GET /TableFilter/system-v167.css HTTP/2.0"] [severity "NOTICE"] [hostname "staklim-malang.info"] [uri "/TableFilter/system-v167.css"] [unique_id "ZuG7G4L53MzrlKz4OB6eUAACAAY"], referer https://staklim-malang.info/index.php/profil/meteorologi/list-of-all-tags/prakiraan-potensi-banjir-di-malang-tahun-2017 [staklim-malang.info] [staklim-malang.info] top=[48519] [OoVJ4VnUakQ] [ZuG7G4L53MzrlKz4OB6eUAACAAY] keep_alive=[1] [2024-09-11 2
... show less
|
Hacking
Web App Attack
|
|
Anonymous
|
|
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
|
Brute-Force
SSH
|
|
Anonymous
|
|
Bot disrespecting robots.txt
|
Bad Web Bot
|
|
hermawan
|
|
[Mon Dec 18 15:24:58.625573 2023] [security2:error] [pid 694879:tid 140352929384000] [client 36.110. ... show more[Mon Dec 18 15:24:58.625573 2023] [security2:error] [pid 694879:tid 140352929384000] [client 36.110.131.14:17273] [client 36.110.131.14] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "python-requests" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/coreruleset-3.3.5/rules/REQUEST-913-SCANNER-DETECTION.conf"] [line "151"] [id "913101"] [msg "Found User-Agent associated with scripting/generic HTTP client"] [data "Matched Data: python-requests found within REQUEST_HEADERS:User-Agent: python-requests/2.28.2 request_line = GET /images/Klimatologi/Analisis/02-Analisis_Dasarian/Analisis_Distribusi_Curah_Hujan_Dasarian/Analisis_Distribusi_Curah_Hujan_Dasarian_Provinsi_Jawa_Timur/2018/09-September-2018/Peta_Analisis_Distribusi_Curah_Hujan_Dasarian_III_September_2018_di_Provinsi_Jawa_Timur.jpg HTTP/1.1"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.5"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-reputation-scripting"] [tag "OWASP_
... show less
|
Hacking
Web App Attack
|
|
Bytemark
|
|
36.110.131.14 - - [18/Dec/2023:03:11:08 +0000] "GET /images/smilies/icon/confused.gif HTTP/1.1" 404 ... show more36.110.131.14 - - [18/Dec/2023:03:11:08 +0000] "GET /images/smilies/icon/confused.gif HTTP/1.1" 404 7210 "-" "python-requests/2.28.2" show less
|
Brute-Force
Web App Attack
|
|
MAGIC
|
|
VM2 Bad user agents ignoring web crawling rules. Draining bandwidth
|
DDoS Attack
Bad Web Bot
|
|
Bytemark
|
|
36.110.131.14 - - [16/Dec/2023:03:01:13 +0000] "GET /images/smilies/icon/mrgreen.gif HTTP/1.1" 404 7 ... show more36.110.131.14 - - [16/Dec/2023:03:01:13 +0000] "GET /images/smilies/icon/mrgreen.gif HTTP/1.1" 404 7210 "-" "python-requests/2.28.2" show less
|
Brute-Force
Web App Attack
|
|
Bytemark
|
|
36.110.131.14 - - [14/Dec/2023:01:36:15 +0000] "GET /images/smilies/eusa/dance.gif HTTP/1.1" 404 721 ... show more36.110.131.14 - - [14/Dec/2023:01:36:15 +0000] "GET /images/smilies/eusa/dance.gif HTTP/1.1" 404 7210 "-" "python-requests/2.28.2" show less
|
Brute-Force
Web App Attack
|
|
MAGIC
|
|
VM5 Bad user agents ignoring web crawling rules. Draing bandwidth
|
DDoS Attack
Bad Web Bot
|
|
hermawan
|
|
[Tue Dec 12 19:13:29.276021 2023] [security2:error] [pid 21920:tid 139749662627392] [client 36.110.1 ... show more[Tue Dec 12 19:13:29.276021 2023] [security2:error] [pid 21920:tid 139749662627392] [client 36.110.131.14:6544] [client 36.110.131.14] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "python-requests" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/coreruleset-3.3.5/rules/REQUEST-913-SCANNER-DETECTION.conf"] [line "151"] [id "913101"] [msg "Found User-Agent associated with scripting/generic HTTP client"] [data "Matched Data: python-requests found within REQUEST_HEADERS:User-Agent: python-requests/2.28.2 request_line = GET /images/Klimatologi/Infografis/Infografis-Iklim/Bulanan/2020/12/Infografis-Bulanan_Prakiraan_Hujan_Bulan_FEBRUARI-MARET-APRIL_Tahun_2021_Update_Dari_Analisis_Bulan_Desember_2020_di_Provinsi_Jawa_Timur-600.webp HTTP/1.1"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.5"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-reputation-scripting"] [tag "OWASP_CRS"] [tag "capec/1000/118/224/541/310"] [tag "PCI/6.5.10"]
... show less
|
Hacking
Web App Attack
|
|
Bytemark
|
|
36.110.131.14 - - [11/Dec/2023:10:25:48 +0000] "GET /images/teacher_1.jpg HTTP/1.1" 200 30661 "-" "p ... show more36.110.131.14 - - [11/Dec/2023:10:25:48 +0000] "GET /images/teacher_1.jpg HTTP/1.1" 200 30661 "-" "python-requests/2.28.2" show less
|
Brute-Force
Web App Attack
|
|
Anonymous
|
|
Excessive crawling/scraping
|
Hacking
Brute-Force
|
|