Rizzy
2024-11-09 09:48:06
(4 minutes ago)
Multiple WAF Violations
Brute-Force
Web App Attack
Hans Wurst
2024-11-09 09:05:14
(47 minutes ago)
45.135.232.70 - - [09/Nov/2024:10:05:14 +0100] "GET /database/.git/config HTTP/1.1" 404 4624 "-" "Em ... show more 45.135.232.70 - - [09/Nov/2024:10:05:14 +0100] "GET /database/.git/config HTTP/1.1" 404 4624 "-" "EmailWolf 1.00"
... show less
Bad Web Bot
Bay13
2024-11-09 06:44:26
(3 hours ago)
f2b http-redirect
Hacking
Web App Attack
onkeltom
2024-11-09 05:35:42
(4 hours ago)
Multiple unauthorized connection attempts
Hacking
Brute-Force
cmbplf
2024-11-09 05:26:44
(4 hours ago)
604 requests to */.git/config
Brute-Force
Bad Web Bot
PlexLads
2024-11-09 03:39:11
(6 hours ago)
45.135.232.70 - - [08/Nov/2024:19:39:10 -0800] "GET /api/.git/config HTTP/1.1" 401 3528 "-" "Mozilla ... show more 45.135.232.70 - - [08/Nov/2024:19:39:10 -0800] "GET /api/.git/config HTTP/1.1" 401 3528 "-" "Mozilla/5.0 (Linux; Android 4.4.2; LGMS323 Build/KOT49I.MS32310b) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/30.0.1599.103 Mobile Safari/537.36" 45.135.232.70 - - [08/Nov/2024:19:39:10 -0800] "GET /api/v1/.git/config HTTP/1.1" 401 3528 "-" "Mozilla/5.0 (Linux; Android 11; ONEPLUS A6000) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Mobile Safari/537.36" 45.135.232.70 - - [08/Nov/2024:19:39:10 -0800] "GET /api/user/v4/.git/config HTTP/1.1" 401 3528 "-" "Mozilla/5.0 (Linux; U; Android 2.2; en-ca; GT-P1000M Build/FROYO) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1" 45.135.232.70 - - [08/Nov/2024:19:39:10 -0800] "GET /api/admin/v2/.git/config HTTP/1.1" 401 3528 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36" 45.135.232.70 - - [08/Nov/2024:19:39:10 -0800] "GET /api/user/v1/.git/config HTTP/1.1"
... show less
Hacking
Web App Attack
Soapy7261
2024-11-08 23:02:40
(10 hours ago)
HTTP Method: GET | Tried to access: /beta/.git/config --- This report is automated ---
Brute-Force
Web App Attack
Savvii
2024-11-08 22:20:57
(11 hours ago)
64 attempts against mh_ha-misbehave-ban on drop
Brute-Force
Bad Web Bot
Web App Attack
MHuiG
2024-11-08 20:09:21
(13 hours ago)
The IP has triggered Cloudflare WAF. action: managed_challenge source: firewallCustom clientAsn: 198 ... show more The IP has triggered Cloudflare WAF. action: managed_challenge source: firewallCustom clientAsn: 198953 clientASNDescription: PROTON66 clientCountryName: RU clientIP: 45.135.232.70 clientRequestHTTPHost: cfpages.blog.mhuig.top clientRequestHTTPMethodName: GET clientRequestHTTPProtocol: HTTP/1.1 clientRequestPath: /public/.git/config clientRequestQuery: datetime: 2024-11-08T18:54:44Z rayName: 8df7c5f65e3a9591 ruleId: f4a2c940dd7944e58e72d246ea29b5af userAgent: Mozilla/5.0 (Linux; Android 12; Pixel 4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.101 Mobile Safari/537.36. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/MHG-LAB/Cloudflare-WAF-to-AbuseIPDB). show less
Open Proxy
VPN IP
Port Scan
Hacking
SQL Injection
Bad Web Bot
Exploited Host
Web App Attack
Nowest
2024-11-08 19:11:57
(14 hours ago)
Bad behaviour when trying to access URL: /gateway/.git/config | Ignores robots.txt | User Agent: Nok ... show more Bad behaviour when trying to access URL: /gateway/.git/config | Ignores robots.txt | User Agent: Nokia7250/1.0 (3.14) Profile/MIDP-1.0 Configuration/CLDC-1.0 show less
Bad Web Bot
Web App Attack
Anonymous
2024-11-08 14:07:23
(19 hours ago)
Ports: *; Direction: 0; Trigger: CT_LIMIT
Brute-Force
SSH
Anonymous
2024-11-08 10:50:19
(23 hours ago)
Ports: 80,443; Direction: 0; Trigger: LF_MODSEC
Brute-Force
SSH
PlexLads
2024-11-08 08:58:43
(1 day ago)
45.135.232.70 - - [08/Nov/2024:00:58:41 -0800] "GET /api/admin/v3/.git/config HTTP/1.1" 401 3528 "-" ... show more 45.135.232.70 - - [08/Nov/2024:00:58:41 -0800] "GET /api/admin/v3/.git/config HTTP/1.1" 401 3528 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)" 45.135.232.70 - - [08/Nov/2024:00:58:41 -0800] "GET /api/user/v1/.git/config HTTP/1.1" 401 3528 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36" 45.135.232.70 - - [08/Nov/2024:00:58:41 -0800] "GET /api/v4/.git/config HTTP/1.1" 401 3528 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.67 Safari/537.36" 45.135.232.70 - - [08/Nov/2024:00:58:41 -0800] "GET /api/v2/.git/config HTTP/1.1" 401 3528 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.102 Safari/537.36" 45.135.232.70 - - [08/Nov/2024:00:58:41 -0800] "GET /api/admin/v1/.git/config HTTP/1.1" 401 3528 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/1
... show less
Hacking
Web App Attack
Soapy7261
2024-11-08 04:34:34
(1 day ago)
HTTP Method: GET | Tried to access: /api/admin/v2/.git/config --- This report is automated ---
Brute-Force
Web App Attack
ATV
2024-11-08 03:08:42
(1 day ago)
Unsolicited connection attempts to ports 443, 80
Hacking