MAGIC
|
|
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
|
DDoS Attack
Bad Web Bot
|
|
rtbh.com.tr
|
|
list.rtbh.com.tr report: tcp/0
|
Brute-Force
|
|
botreporter
|
|
bot wiki account creation attempts
|
Web Spam
Bad Web Bot
|
|
rtbh.com.tr
|
|
list.rtbh.com.tr report: tcp/0
|
Brute-Force
|
|
ghostwarriors
|
|
Webpage scraping
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
ksol-hostmaster
|
|
2024/09/01 03:37:22 [error] 5107#758480: *4753827 access forbidden by rule, client: 37.143.63.191, s ... show more2024/09/01 03:37:22 [error] 5107#758480: *4753827 access forbidden by rule, client: 37.143.63.191, server: git.ksol.io, request: "GET /karolyi/django-multiselectfield/commit/349fa8d9a9cfb878ead95fd6373ddf0114d46469?style=unified&whitespace=ignore-all&show-outdated= HTTP/1.1", host: "git.ksol.io"
... show less
|
Web Spam
|
|
botreporter
|
|
bot wiki account creation attempts
|
Web Spam
Bad Web Bot
|
|
botreporter
|
|
bot wiki account creation attempts
|
Web Spam
Bad Web Bot
|
|
MAGIC
|
|
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
|
DDoS Attack
Bad Web Bot
|
|
rtbh.com.tr
|
|
list.rtbh.com.tr report: tcp/0
|
Brute-Force
|
|
ghostwarriors
|
|
Webpage scraping
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
ksol-hostmaster
|
|
2024/08/17 14:54:07 [error] 98947#374772: *4226359 access forbidden by rule, client: 37.143.63.191, ... show more2024/08/17 14:54:07 [error] 98947#374772: *4226359 access forbidden by rule, client: 37.143.63.191, server: git.ksol.io, request: "GET / HTTP/1.1", host: "git.ksol.io", referrer: "https://git.ksol.io"
... show less
|
Web Spam
|
|
el-brujo
|
|
Cloudflare WAF: Request Path: /xmlrpc.php Request Query: Host: hwagm.elhacker.net userAgent: Mozill ... show moreCloudflare WAF: Request Path: /xmlrpc.php Request Query: Host: hwagm.elhacker.net userAgent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36 Action: managed_challenge Source: firewallManaged ASN Description: ASDETUK www.heficed.com Country: GB Method: POST Timestamp: 2024-08-16T07:41:53Z ruleId: 5de7edfa648c4d6891dc3e7f84534ffa. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/MHG-LAB/Cloudflare-WAF-to-AbuseIPDB). show less
|
Hacking
SQL Injection
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:210350) triggered by 37.143.63.191 (-): 1 in the last 300 secs; Port ... show more(mod_security) mod_security (id:210350) triggered by 37.143.63.191 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Wed Aug 14 19:11:56.086039 2024] [security2:error] [pid 10305:tid 10305] [client 37.143.63.191:55181] [client 37.143.63.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "\\\\b(close|keep-alive),[\\\\t\\\\n\\\\r ]{0,1}(close|keep-alive)\\\\b" at REQUEST_HEADERS:Connection. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/12_HTTP_Protocol.conf"] [line "70"] [id "210350"] [rev "1"] [msg "COMODO WAF: Multiple/Conflicting Connection Header Data Found||www.med-engineering.com|F|4"] [data "keep-alive, close"] [severity "WARNING"] [tag "CWAF"] [tag "Protocol"] [hostname "www.med-engineering.com"] [uri "/index.php/component/users/"] [unique_id "Zr05vPEaNiqPpGIAGNbxgwAAAAQ"], referer: https://www.med-engineering.com/ show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
Anonymous
|
|
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
|
Brute-Force
SSH
|
|