(mod_security) mod_security (id:400010) triggered by 47.100.46.2 (CN/China/-): 5 in the last 3600 se ... show more(mod_security) mod_security (id:400010) triggered by 47.100.46.2 (CN/China/-): 5 in the last 3600 secs show less
WordPress XML-RPC attack with username "admin" and password "@123".
Method Name: system.multic ... show moreWordPress XML-RPC attack with username "admin" and password "@123".
Method Name: system.multicall, Route: wp.getUsersBlogs
Request: POST /xmlrpc.php
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0 show less
WordPress XML-RPC attack with username "admin" and password "<DOMAIN>@1234".
Method Name: syst ... show moreWordPress XML-RPC attack with username "admin" and password "<DOMAIN>@1234".
Method Name: system.multicall, Route: wp.getUsersBlogs
Request: POST /xmlrpc.php
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0 show less
WordPress XML-RPC attack with username "admin" and password "blogger".
Method Name: system.mul ... show moreWordPress XML-RPC attack with username "admin" and password "blogger".
Method Name: system.multicall, Route: wp.getUsersBlogs
Request: POST /xmlrpc.php
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0 show less
WordPress XML-RPC attack with username "admin" and password "[email protected]".
Method Name: system.m ... show moreWordPress XML-RPC attack with username "admin" and password "[email protected]".
Method Name: system.multicall, Route: wp.getUsersBlogs
Request: POST /xmlrpc.php
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0 show less
WordPress XML-RPC attack with username "admin" and password "12345".
Method Name: system.multi ... show moreWordPress XML-RPC attack with username "admin" and password "12345".
Method Name: system.multicall, Route: wp.getUsersBlogs
Request: POST /xmlrpc.php
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0 show less
WordPress XML-RPC attack with username "admin" and password "@111".
Method Name: system.multic ... show moreWordPress XML-RPC attack with username "admin" and password "@111".
Method Name: system.multicall, Route: wp.getUsersBlogs
Request: POST /xmlrpc.php
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0 show less
Web SpamBrute-ForceBad Web BotWeb App Attack
Anonymous
[Fri May 20 16:34:39.422137 2022] [access_compat:error] [pid 8945] [client 47.100.46.2:36244] AH0179 ... show more[Fri May 20 16:34:39.422137 2022] [access_compat:error] [pid 8945] [client 47.100.46.2:36244] AH01797: client denied by server configuration: /var/www/vhosts/traumatic.de/httpdocs/www/particular_sound/wordpress/xmlrpc.php
[Sun May 22 12:08:33.944051 2022] [access_compat:error] [pid 5580] [client 47.100.46.2:48328] AH01797: client denied by server configuration: /var/www/vhosts/traumatic.de/httpdocs/www/particular_sound/wordpress/xmlrpc.php
[Sun May 22 14:49:23.632237 2022] [access_compat:error] [pid 9667] [client 47.100.46.2:51726] AH01797: client denied by server configuration: /var/www/vhosts/traumatic.de/httpdocs/www/particular_sound/wordpress/xmlrpc.php
[Fri May 27 11:03:58.178477 2022] [access_compat:error] [pid 17978] [client 47.100.46.2:59176] AH01797: client denied by server configuration: /var/www/vhosts/traumatic.de/httpdocs/www/particular_sound/wordpress/xmlrpc.php
[Sun May 29 07:29:21.085442 2022] [access_compat:error] [pid 29627] [client 47.100.46.2:36660] AH01797: client
... show less