MAGIC
2025-03-23 21:11:12
(4 days ago)
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot
Anonymous
2025-03-20 05:05:11
(1 week ago)
Ports: 80,443; Direction: 1; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
hermawan
2025-03-18 22:39:50
(1 week ago)
[Wed Mar 19 05:39:05.028455 2025] [security2:error] [pid 88214:tid 140047499036352] [client 47.128.1 ... show more [Wed Mar 19 05:39:05.028455 2025] [security2:error] [pid 88214:tid 140047499036352] [client 47.128.126.152:12314] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "Feed" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/coreruleset-4.10.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "187"] [id "440000"] [msg "BAD BOT - Detected and Blocked"] [data "Matched Data: Feed found within REQUEST_HEADERS:User-Agent: Mozilla/5.0 (Linux; Android 5.0) AppleWebKit/537.36 (KHTML, like Gecko) Mobile Safari/537.36 (compatible; Bytespider; [email protected] ) request_line = GET /index.php/prakiraan-iklim/prakiraan-bulanan/prakiraan-curah-hujan-bulanan/555559003-prakiraan-bulanan-curah-hujan-bulan-desember-tahun-2021-update-dari-analisis-bulan-agustus-tahun-2021-di-provinsi-jawa-timur HTTP/2.0"] [severity "NOTICE"] [hostname "staklim-malang.info"] [uri "/index.php/prakiraan-iklim/prakiraan-bulanan/prakiraan-curah-hujan-bulanan/555559003-prakiraan-bulanan-curah-hu
... show less
Hacking
Web App Attack
Anonymous
2025-03-09 02:38:41
(2 weeks ago)
Ports: 80,443; Direction: 1; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
Anonymous
2025-03-07 06:51:16
(2 weeks ago)
Ports: 80,443; Direction: 1; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
backslash
2025-02-27 22:30:12
(1 month ago)
block ruleset 3D3AFA921A373ECE19B6BA285C2D722163304638
Bad Web Bot
MAGIC
2025-02-21 11:01:55
(1 month ago)
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot
Steve
2025-02-20 22:32:31
(1 month ago)
Excessive crawling - not obeying robots.txt
Bad Web Bot
TPI-Abuse
2025-02-20 03:10:20
(1 month ago)
(mod_security) mod_security (id:210730) triggered by 47.128.126.152 (ec2-47-128-126-152.ap-southeast ... show more (mod_security) mod_security (id:210730) triggered by 47.128.126.152 (ec2-47-128-126-152.ap-southeast-1.compute.amazonaws.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Wed Feb 19 22:10:16.635670 2025] [security2:error] [pid 4145:tid 4153] [client 47.128.126.152:35630] [client 47.128.126.152] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||digital4z.com|F|2"] [data ".log"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "digital4z.com"] [uri "/Digital4z.com/Digital4z/wp-content/plugins/jetpack/modules/widget-visibility/widget-conditions/rtl/WS_FTP.LOG"] [unique_id "Z7adGOvN5N72Blk7peBkAgAAAAI"] show less
Brute-Force
Bad Web Bot
Web App Attack
MAGIC
2025-02-18 14:03:01
(1 month ago)
VM5 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot
Anonymous
2025-02-18 00:44:46
(1 month ago)
Excessive crawling/scraping
Hacking
Brute-Force
Séfora Srl
2025-02-13 17:17:57
(1 month ago)
Bad user agents ignoring web crawling rules. Draing bandwidth - detected by Fail2Ban in plesk-apache ... show more Bad user agents ignoring web crawling rules. Draing bandwidth - detected by Fail2Ban in plesk-apache-badbot jail show less
Bad Web Bot
Séfora Srl
2025-02-12 06:40:30
(1 month ago)
Bad user agents ignoring web crawling rules. Draing bandwidth - detected by Fail2Ban in plesk-apache ... show more Bad user agents ignoring web crawling rules. Draing bandwidth - detected by Fail2Ban in plesk-apache-badbot jail show less
Bad Web Bot
hermawan
2025-02-11 19:46:05
(1 month ago)
[Wed Feb 12 01:39:34.954375 2025] [security2:error] [pid 64993:tid 139628759721664] [client 47.128.1 ... show more [Wed Feb 12 01:39:34.954375 2025] [security2:error] [pid 64993:tid 139628759721664] [client 47.128.126.152:15368] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "Feed" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/coreruleset-4.10.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "165"] [id "440000"] [msg "BAD BOT - Detected and Blocked"] [data "Matched Data: Feed found within REQUEST_HEADERS:User-Agent: Mozilla/5.0 (Linux; Android 5.0) AppleWebKit/537.36 (KHTML, like Gecko) Mobile Safari/537.36 (compatible; Bytespider; [email protected] ) request_line = GET /index.php/profil/arsip-artikel?id=482&start=120 HTTP/2.0"] [severity "NOTICE"] [hostname "staklim-jatim.bmkg.go.id"] [uri "/index.php/profil/arsip-artikel"] [unique_id "Z6uZZkZjXKDxp1SkTuZElAAAKgQ"] [staklim-jatim.bmkg.go.id] [staklim-jatim.bmkg.go.id] top=[64998] [WDt4JeqaUxc] [Z6uZZkZjXKDxp1SkTuZElAAAKgQ] keep_alive=[1] [2025-02-12 01:39:34.954381] [R:Z6uZZkZjXKDxp1SkTuZElAAAKgQ] UA:'M
... show less
Hacking
Web App Attack
librebit
2025-02-03 21:04:35
(1 month ago)
Brute force
Brute-Force