TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 37.245.57.10 (-): 1 in the last 300 secs; Ports ... show more(mod_security) mod_security (id:225170) triggered by 37.245.57.10 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Dec 22 03:40:02.906667 2024] [security2:error] [pid 483:tid 483] [client 37.245.57.10:54894] [client 37.245.57.10] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.writebetweenthelines.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.writebetweenthelines.com"] [uri "/wp-json/wp/v2/users/1"] [unique_id "Z2fQYlKXchJ69B5t6rFUUQAAAAA"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
Anonymous
|
|
Malicious activity detected
|
Hacking
Web App Attack
|
|
ManagedStack
|
|
Wordpress Attack
|
Web App Attack
|
|
octageeks.com
|
|
Wordpress malicious attack:[octawpauthor]
|
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 37.245.57.10 (-): 1 in the last 300 secs; Ports ... show more(mod_security) mod_security (id:225170) triggered by 37.245.57.10 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Dec 09 20:21:36.599534 2024] [security2:error] [pid 2363467:tid 2363467] [client 37.245.57.10:61883] [client 37.245.57.10] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||grabagame.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "grabagame.com"] [uri "/wp-json/wp/v2/users/1"] [unique_id "Z1eXoEtOtB1QYPqF9KdWCQAAAA4"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
URAN Publishing Service
|
|
37.245.57.10 - - [09/Dec/2024:23:35:34 +0200] "GET /wp-login.php HTTP/1.1" 404 2622 "-" "Mozilla/5.0 ... show more37.245.57.10 - - [09/Dec/2024:23:35:34 +0200] "GET /wp-login.php HTTP/1.1" 404 2622 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
37.245.57.10 - - [09/Dec/2024:23:35:35 +0200] "GET /xmlrpc.php HTTP/1.1" 404 366 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
... show less
|
Web App Attack
|
|
Anonymous
|
|
Malicious activity detected
|
Hacking
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 37.245.57.10 (-): 1 in the last 300 secs; Ports ... show more(mod_security) mod_security (id:225170) triggered by 37.245.57.10 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri Dec 06 03:07:15.773532 2024] [security2:error] [pid 12070:tid 12158] [client 37.245.57.10:50187] [client 37.245.57.10] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.quantumgaze.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.quantumgaze.com"] [uri "/wp-json/wp/v2/users/1"] [unique_id "Z1Kws5Gi5LMY_P_3BRSUKgAAAlA"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
selahattinalan
|
|
4:12:1737.245.57.10 - - [29/Nov/2024:04:26:24 +0300] "GET /xmlrpc.php HTTP/1.1" 404 370 "-" "Mozilla ... show more4:12:1737.245.57.10 - - [29/Nov/2024:04:26:24 +0300] "GET /xmlrpc.php HTTP/1.1" 404 370 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko" show less
|
Brute-Force
|
|
pa4080
|
|
Detected by ModSecurity. Request URI: /wp-login.php
|
Web App Attack
|
|
Anonymous
|
|
Trawling for Open Source CMS installs
|
Hacking
Brute-Force
|
|
Boxis.net NOC
|
|
(wordpress_login) WordPress Login Attack 37.245.57.10 (-): 3 in the last 3600 secs; Ports: *; Direct ... show more(wordpress_login) WordPress Login Attack 37.245.57.10 (-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_CUSTOMTRIGGER; Logs: 37.245.57.10 - - [21/Nov/2024:01:15:28 +0100] "GET /xmlrpc.php HTTP/1.1" 404 27 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
37.245.57.10 - - [21/Nov/2024:01:15:28 +0100] "GET /wp-login.php HTTP/1.1" 301 162 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
37.245.57.10 - - [21/Nov/2024:01:15:28 +0100] "GET /wp-login.php HTTP/1.1" 404 27 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko" show less
|
Port Scan
|
|