TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 46.42.102.193 (-): 1 in the last 300 secs; Port ... show more(mod_security) mod_security (id:225170) triggered by 46.42.102.193 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Wed Jan 01 00:05:36.226466 2025] [security2:error] [pid 14318:tid 14318] [client 46.42.102.193:64808] [client 46.42.102.193] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.theseventhcongregationofladderdayvixens.org|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.theseventhcongregationofladderdayvixens.org"] [uri "/wp-json/wp/v2/users/1"] [unique_id "Z3TNIFTPTA7msQdupfAzTwAAAAo"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
MAGIC
|
|
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
|
DDoS Attack
Bad Web Bot
|
|
selahattinalan
|
|
46.42.102.193 - - [28/Dec/2024:15:09:01 +0300] "GET /xmlrpc.php HTTP/1.1" 404 370 "-" "Mozilla/5.0 ( ... show more46.42.102.193 - - [28/Dec/2024:15:09:01 +0300] "GET /xmlrpc.php HTTP/1.1" 404 370 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko" show less
|
Brute-Force
|
|
Anonymous
|
|
Malicious activity detected
|
Hacking
Web App Attack
|
|
TheMadBeaker
|
|
Fail2Ban Ban Triggered
Wordpress Attack Attempt
|
Brute-Force
Web App Attack
|
|
MAGIC
|
|
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
|
DDoS Attack
Bad Web Bot
|
|
axllent
|
|
Wordpress login scanning
|
Brute-Force
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 46.42.102.193 (-): 1 in the last 300 secs; Port ... show more(mod_security) mod_security (id:225170) triggered by 46.42.102.193 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Nov 10 00:44:50.706586 2024] [security2:error] [pid 1179959:tid 1179959] [client 46.42.102.193:58927] [client 46.42.102.193] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||tradersworldmarket.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "tradersworldmarket.com"] [uri "/wp-json/wp/v2/users/1"] [unique_id "ZzBIUrIb4pyR447d4_UKlgAAAAE"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
Anonymous
|
|
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
|
Brute-Force
SSH
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 46.42.102.193 (-): 1 in the last 300 secs; Port ... show more(mod_security) mod_security (id:225170) triggered by 46.42.102.193 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Oct 07 05:57:20.856682 2024] [security2:error] [pid 8470:tid 8470] [client 46.42.102.193:64776] [client 46.42.102.193] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||grabagame.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "grabagame.com"] [uri "/wp-json/wp/v2/users/1"] [unique_id "ZwOwgJ_9uF_H4brfa5NqfgAAAAI"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
Bytemark
|
|
46.42.102.193 - - [10/Sep/2024:14:04:22 +0100] "GET /wp-login.php HTTP/1.1" 404 5055 "-" "Mozilla/5. ... show more46.42.102.193 - - [10/Sep/2024:14:04:22 +0100] "GET /wp-login.php HTTP/1.1" 404 5055 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
46.42.102.193 - - [10/Sep/2024:14:04:23 +0100] "GET /xmlrpc.php HTTP/1.1" 404 219 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
46.42.102.193 - - [10/Sep/2024:14:04:23 +0100] "GET /wp-login.php HTTP/1.1" 404 219 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko" show less
|
Brute-Force
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 46.42.102.193 (-): 1 in the last 300 secs; Port ... show more(mod_security) mod_security (id:225170) triggered by 46.42.102.193 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Aug 11 03:24:10.111363 2024] [security2:error] [pid 16508:tid 16508] [client 46.42.102.193:49346] [client 46.42.102.193] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.quickasawink.org|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.quickasawink.org"] [uri "/wp-json/wp/v2/users/1"] [unique_id "ZrhnGjBUCtW0zmEy9PA2pQAAAAQ"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
URAN Publishing Service
|
|
46.42.102.193 - - [09/Aug/2024:13:31:12 +0300] "GET /wp-login.php HTTP/1.1" 404 2615 "-" "Mozilla/5. ... show more46.42.102.193 - - [09/Aug/2024:13:31:12 +0300] "GET /wp-login.php HTTP/1.1" 404 2615 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
46.42.102.193 - - [09/Aug/2024:13:31:13 +0300] "GET /xmlrpc.php HTTP/1.1" 404 366 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
... show less
|
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 46.42.102.193 (-): 1 in the last 300 secs; Port ... show more(mod_security) mod_security (id:225170) triggered by 46.42.102.193 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Jul 29 23:56:29.335868 2024] [security2:error] [pid 15984:tid 16008] [client 46.42.102.193:50212] [client 46.42.102.193] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||aafm.us|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "aafm.us"] [uri "/wp-json/wp/v2/users/1"] [unique_id "ZqhkbUXek1mwy3Le-gaqSQAAAQg"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
Anonymous
|
|
Malicious activity detected
|
Hacking
Web App Attack
|
|