Mendip_Defender
2025-03-26 02:34:26
(2 days ago)
47.128.16.53 - - [26/Mar/2025:02:34:22 +0000] "GET /?%3Fs=01d94457e878430c9b8a83c5ebc41956 HTTP/1.0" ... show more 47.128.16.53 - - [26/Mar/2025:02:34:22 +0000] "GET /?%3Fs=01d94457e878430c9b8a83c5ebc41956 HTTP/1.0" 301 850 "-" "Mozilla/5.0 (Linux; Android 5.0) AppleWebKit/537.36 (KHTML, like Gecko) Mobile Safari/537.36 (compatible; Bytespider; [email protected] )"
... show less
Bad Web Bot
TPI-Abuse
2025-03-19 03:19:41
(1 week ago)
(mod_security) mod_security (id:210730) triggered by 47.128.16.53 (ec2-47-128-16-53.ap-southeast-1.c ... show more (mod_security) mod_security (id:210730) triggered by 47.128.16.53 (ec2-47-128-16-53.ap-southeast-1.compute.amazonaws.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Mar 18 23:19:35.933875 2025] [security2:error] [pid 1917:tid 1917] [client 47.128.16.53:31236] [client 47.128.16.53] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||www.remedialconcepts.com|F|2"] [data ".dat"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "www.remedialconcepts.com"] [uri "/3300/data/Assembly.dat"] [unique_id "Z9o3x_YCnHIAA_LcaFcMogAAAA4"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2025-03-18 10:08:37
(1 week ago)
(mod_security) mod_security (id:210730) triggered by 47.128.16.53 (ec2-47-128-16-53.ap-southeast-1.c ... show more (mod_security) mod_security (id:210730) triggered by 47.128.16.53 (ec2-47-128-16-53.ap-southeast-1.compute.amazonaws.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Mar 18 06:08:32.854170 2025] [security2:error] [pid 228496:tid 228496] [client 47.128.16.53:45832] [client 47.128.16.53] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||med-engineering.com|F|2"] [data ".com"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "med-engineering.com"] [uri "/ginsengbuy.com"] [unique_id "Z9lGIEcbJ73Jhk2T7Q5DgAAAABc"] show less
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
2025-03-13 03:08:10
(2 weeks ago)
Ports: 80,443; Direction: 1; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
backslash
2025-03-04 13:25:09
(3 weeks ago)
block ruleset 3D3AFA921A373ECE19B6BA285C2D722163304638
Bad Web Bot
MAGIC
2025-02-25 14:08:15
(1 month ago)
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot
ipblock.com
2025-02-19 11:07:56
(1 month ago)
IPBlock protected site ID [1365-l].
Bad agent
Bad Web Bot
Josh S.
2025-02-18 09:52:14
(1 month ago)
Triggered Cloudflare WAF (firewallCustom) from SG.
Action taken: BLOCK
ASN: 16509 (AMAZO ... show more Triggered Cloudflare WAF (firewallCustom) from SG.
Action taken: BLOCK
ASN: 16509 (AMAZON-02)
Protocol: HTTP/2 (GET method)
Zone: git.joshseveros.cloud
Timestamp: 2025-02-18T09:50:57Z
UA: Mozilla/5.0 (Linux; Android 5.0) AppleWebKit/537.36 (KHTML, like Gecko) Mobile Safari/537.36 (compatible; Bytespider; [email protected] )
If this was a mistake contact me: [email protected] show less
Bad Web Bot
Séfora Srl
2025-02-13 15:42:24
(1 month ago)
Bad user agents ignoring web crawling rules. Draing bandwidth - detected by Fail2Ban in plesk-apache ... show more Bad user agents ignoring web crawling rules. Draing bandwidth - detected by Fail2Ban in plesk-apache-badbot jail show less
Bad Web Bot
Steve
2025-02-13 13:28:00
(1 month ago)
Excessive crawling - not obeying robots.txt
Bad Web Bot
Séfora Srl
2025-02-12 06:39:23
(1 month ago)
Bad user agents ignoring web crawling rules. Draing bandwidth - detected by Fail2Ban in plesk-apache ... show more Bad user agents ignoring web crawling rules. Draing bandwidth - detected by Fail2Ban in plesk-apache-badbot jail show less
Bad Web Bot
Anonymous
2025-02-10 04:52:19
(1 month ago)
Ports: 80,443; Direction: 1; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
Anonymous
2025-02-09 03:45:46
(1 month ago)
Ports: 80,443; Direction: 1; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
Mendip_Defender
2025-02-01 04:42:54
(1 month ago)
47.128.16.53 - - [01/Feb/2025:04:42:56 +0000] "GET /?s=0b2192048e6d356cefd56ec15ac01f9a&t=1058&goto= ... show more 47.128.16.53 - - [01/Feb/2025:04:42:56 +0000] "GET /?s=0b2192048e6d356cefd56ec15ac01f9a&t=1058&goto=nextnewest HTTP/1.0" 200 10098 "-" "Mozilla/5.0 (Linux; Android 5.0) AppleWebKit/537.36 (KHTML, like Gecko) Mobile Safari/537.36 (compatible; Bytespider; [email protected] )"
... show less
Bad Web Bot
Anonymous
2025-01-29 06:02:24
(1 month ago)
Ports: 80,443; Direction: 1; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH