rtbh.com.tr
|
|
list.rtbh.com.tr report: tcp/0
|
Brute-Force
|
|
rtbh.com.tr
|
|
list.rtbh.com.tr report: tcp/0
|
Brute-Force
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com ... show more(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Nov 10 19:44:03.012206 2024] [security2:error] [pid 25593:tid 25593] [client 45.63.84.234:59798] [client 45.63.84.234] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.burnbuns.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.burnbuns.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "ZzFTU-K8sKycz1iJtZ6qkAAAAAI"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
rtbh.com.tr
|
|
list.rtbh.com.tr report: tcp/0
|
Brute-Force
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com ... show more(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Nov 10 14:14:57.872837 2024] [security2:error] [pid 27438:tid 27438] [client 45.63.84.234:33086] [client 45.63.84.234] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.joecouttswoodsculptor.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.joecouttswoodsculptor.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "ZzEGMRnc0f5jb-GUa3601QAAABw"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com ... show more(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Nov 10 10:29:07.561415 2024] [security2:error] [pid 1629527:tid 1629527] [client 45.63.84.234:57436] [client 45.63.84.234] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.barbaraedidin.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.barbaraedidin.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "ZzDRQ85mC5945w6OdMQ-BQAAABI"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com ... show more(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Nov 10 09:19:22.159125 2024] [security2:error] [pid 25165:tid 25165] [client 45.63.84.234:44568] [client 45.63.84.234] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.b2c-llc.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.b2c-llc.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "ZzDA6ljeNjnCeurz8FMDpgAAAAY"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com ... show more(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Nov 10 07:01:37.697589 2024] [security2:error] [pid 857:tid 857] [client 45.63.84.234:60192] [client 45.63.84.234] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.testrong.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.testrong.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "ZzCgod8qDI35NMymWleaPgAAAAs"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com ... show more(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Nov 10 06:05:12.568763 2024] [security2:error] [pid 27768:tid 27768] [client 45.63.84.234:60892] [client 45.63.84.234] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.tech-servusa.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.tech-servusa.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "ZzCTaHVH1s3WD-ydV-TnHwAAAAY"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com ... show more(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Nov 10 03:27:51.186552 2024] [security2:error] [pid 3413369:tid 3413369] [client 45.63.84.234:56462] [client 45.63.84.234] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4539"] [id "240950"] [rev "1"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.antoniocobo.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.antoniocobo.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "ZzBuhwnABVkuelrudgI3JAAAAAE"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com ... show more(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Nov 10 02:04:59.058657 2024] [security2:error] [pid 11474:tid 11474] [client 45.63.84.234:37736] [client 45.63.84.234] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.amtnm.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.amtnm.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "ZzBbG_gMcVv6lW4IvagwUQAAAAc"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com ... show more(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 23:42:37.295448 2024] [security2:error] [pid 27132:tid 27132] [client 45.63.84.234:47746] [client 45.63.84.234] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.linhsbridal.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.linhsbridal.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "ZzA5vVD8MRBLWtCh8DCfHAAAABM"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
Anonymous
|
|
45.63.84.234 (US/United States/45.63.84.234.vultrusercontent.com) blocked with too many connections
|
DDoS Attack
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com ... show more(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 22:29:04.675919 2024] [security2:error] [pid 18531:tid 18531] [client 45.63.84.234:55570] [client 45.63.84.234] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.hamiltonbookings.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.hamiltonbookings.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "ZzAogNPNJHZ8XQCgdtm4fgAAAAo"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com ... show more(mod_security) mod_security (id:240950) triggered by 45.63.84.234 (45.63.84.234.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 20:33:21.361339 2024] [security2:error] [pid 3900:tid 3900] [client 45.63.84.234:39502] [client 45.63.84.234] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.africanwisdominimageandproverb.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.africanwisdominimageandproverb.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "ZzANYSTAcag9U5ROI1nMbAAAAA8"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|