smopdidi
2024-11-14 22:58:15
(4 weeks ago)
Ports: 80; 5 attempts
Port Scan
MAGIC
2024-11-12 02:01:08
(1 month ago)
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot
MHuiG
2024-10-31 00:41:36
(1 month ago)
The IP has triggered Cloudflare WAF. action: managed_challenge source: firewallCustom clientAsn: 203 ... show more The IP has triggered Cloudflare WAF. action: managed_challenge source: firewallCustom clientAsn: 203020 clientASNDescription: HOSTROYALE clientCountryName: RU clientIP: 45.90.62.79 clientRequestHTTPHost: ssl.mhuig.top clientRequestHTTPMethodName: GET clientRequestHTTPProtocol: HTTP/1.1 clientRequestPath: /favicon.ico clientRequestQuery: datetime: 2024-10-30T23:50:03Z rayName: 8daf4e324e03e3bd ruleId: f4a2c940dd7944e58e72d246ea29b5af userAgent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/MHG-LAB/Cloudflare-WAF-to-AbuseIPDB). show less
Open Proxy
VPN IP
Port Scan
Hacking
SQL Injection
Bad Web Bot
Exploited Host
Web App Attack
sefinek.net
2024-10-19 02:50:58
(1 month ago)
Triggered Cloudflare WAF (firewallCustom) from RU.
Action taken: CHALLENGE
ASN: 203020 ( ... show more Triggered Cloudflare WAF (firewallCustom) from RU.
Action taken: CHALLENGE
ASN: 203020 (HOSTROYALE)
Protocol: HTTP/1.1 (method GET)
Domain: stella-ws.sefinek.net
Endpoint: /favicon.ico
Timestamp: 2024-10-19T02:13:43Z
Ray ID: 8d4d40222f6bcc58
Rule ID: cc5e7a6277d447eca9c1818934ba65c8
UA: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36
Report generated by Node-Cloudflare-WAF-AbuseIPDB https://github.com/sefinek24/Node-Cloudflare-WAF-AbuseIPDB show less
Bad Web Bot
MPL
2024-09-30 20:44:26
(2 months ago)
tcp/80 (8 or more attempts)
Port Scan
MPL
2024-09-30 19:05:47
(2 months ago)
tcp/443 (8 or more attempts)
Port Scan
sefinek.net
2024-09-25 07:53:16
(2 months ago)
Triggered Cloudflare WAF (firewallCustom).
Action taken: CHALLENGE
ASN: 203020 (HOSTROYA ... show more Triggered Cloudflare WAF (firewallCustom).
Action taken: CHALLENGE
ASN: 203020 (HOSTROYALE) [RU]
Protocol: HTTP/1.1 (method GET)
Domain: market.sefinek.net
Endpoint: /favicon.ico
Timestamp: 2024-09-24T23:00:15Z
Ray ID: 8c8663bc5fe169f6
Rule ID: cc5e7a6277d447eca9c1818934ba65c8
UA: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36
Report generated by Node-Cloudflare-WAF-AbuseIPDB https://github.com/sefinek24/Node-Cloudflare-WAF-AbuseIPDB show less
Bad Web Bot
advena
2024-09-10 02:00:58
(3 months ago)
45.90.62.79 (AS203020 HOSTROYALE) was intercepted at 2024-09-10T01:59:28Z after violating WAF direct ... show more 45.90.62.79 (AS203020 HOSTROYALE) was intercepted at 2024-09-10T01:59:28Z after violating WAF directive: country. Pre-cautionary/corrective action applied: block. show less
Web Spam
Hacking
Brute-Force
Web App Attack
Anonymous
2024-09-03 22:35:14
(3 months ago)
Ignores robots.txt and noindex, nofollow meta/header directives (Honeypot).
UserAgent: Mozill ... show more Ignores robots.txt and noindex, nofollow meta/header directives (Honeypot).
UserAgent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36 show less
Bad Web Bot
MAGIC
2024-08-13 17:01:06
(3 months ago)
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot
SaltySoftworks
2024-08-10 12:39:59
(4 months ago)
Page: /lander/testsberv4-copy--1/
Hacking
SQL Injection
Brute-Force
Web App Attack
lauraorchid
2024-08-07 09:33:57
(4 months ago)
2024/08/07 09:33:45 [error] 1263#1263: *451 open() "/var/www/waves/t85TjsNn" failed (2: No such file ... show more 2024/08/07 09:33:45 [error] 1263#1263: *451 open() "/var/www/waves/t85TjsNn" failed (2: No such file or directory), client: 45.90.62.79, server: lunarwaves.live, request: "GET /t85TjsNn HTTP/1.1", host: "lunarwaves.live"
2024/08/07 09:33:50 [error] 1263#1263: *451 open() "/var/www/waves/favicon.ico" failed (2: No such file or directory), client: 45.90.62.79, server: lunarwaves.live, request: "GET /favicon.ico HTTP/1.1", host: "lunarwaves.live"
2024/08/07 09:33:56 [error] 1263#1263: *451 open() "/var/www/waves/sb" failed (2: No such file or directory), client: 45.90.62.79, server: lunarwaves.live, request: "GET /sb HTTP/1.1", host: "lunarwaves.live"
... show less
Bad Web Bot
sbk97 (https://sayor.online)
2024-07-18 23:06:58
(4 months ago)
GET / HTTP/1.1
Web App Attack
Anonymous
2024-07-15 04:54:57
(4 months ago)
Ports: 20,21,25,53,80,110,143,443,465,587,993,995,2077,2078,2079,2080,2082,2083,2086,2087,2095,2096, ... show more Ports: 20,21,25,53,80,110,143,443,465,587,993,995,2077,2078,2079,2080,2082,2083,2086,2087,2095,2096,3306,2195; Direction: 0; Trigger: LF_CUSTOMTRIGGER show less
Brute-Force
SSH
ParaBug
2024-07-09 04:13:46
(5 months ago)
45.90.62.79 - - [09/Jul/2024:06:13:45 +0200] "GET /lander/gp_newmain_calc_ru_land_obj_js_v2/index.ph ... show more 45.90.62.79 - - [09/Jul/2024:06:13:45 +0200] "GET /lander/gp_newmain_calc_ru_land_obj_js_v2/index.php HTTP/1.1" 404 3420 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36"
... show less
Phishing
Brute-Force
Web App Attack