Steve
2025-03-01 05:30:19
(2 weeks ago)
Excessive crawling - not obeying robots.txt
Bad Web Bot
backslash
2025-02-27 21:50:11
(2 weeks ago)
block ruleset 3D3AFA921A373ECE19B6BA285C2D722163304638
Bad Web Bot
Séfora Srl
2025-02-13 08:18:18
(1 month ago)
Bad user agents ignoring web crawling rules. Draing bandwidth - detected by Fail2Ban in plesk-apache ... show more Bad user agents ignoring web crawling rules. Draing bandwidth - detected by Fail2Ban in plesk-apache-badbot jail show less
Bad Web Bot
MAGIC
2025-02-12 11:05:35
(1 month ago)
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot
MAGIC
2025-02-09 00:04:09
(1 month ago)
VM5 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot
Anonymous
2025-02-08 16:57:05
(1 month ago)
Ports: 80,443; Direction: 1; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
ThreatBook.io
2025-01-29 01:01:44
(1 month ago)
2025-01-28 13:23:00 /cc.gif
Web App Attack
backslash
2025-01-24 11:45:19
(1 month ago)
block ruleset 3D3AFA921A373ECE19B6BA285C2D722163304638
Bad Web Bot
TPI-Abuse
2025-01-23 15:50:18
(1 month ago)
(mod_security) mod_security (id:210730) triggered by 47.128.36.153 (ec2-47-128-36-153.ap-southeast-1 ... show more (mod_security) mod_security (id:210730) triggered by 47.128.36.153 (ec2-47-128-36-153.ap-southeast-1.compute.amazonaws.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Thu Jan 23 10:50:15.106225 2025] [security2:error] [pid 29761:tid 29778] [client 47.128.36.153:17150] [client 47.128.36.153] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||kd9uri.com|F|2"] [data ".cfg"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "kd9uri.com"] [uri "/pics/DRfiles/INGODRBase XW-802AA8787075.cfg"] [unique_id "Z5JlN3iCfGQSjQjn7V5vrgAAAM4"] show less
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
2025-01-23 02:03:00
(1 month ago)
Ports: 80,443; Direction: 1; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
TPI-Abuse
2025-01-12 22:43:27
(2 months ago)
(mod_security) mod_security (id:210730) triggered by 47.128.36.153 (ec2-47-128-36-153.ap-southeast-1 ... show more (mod_security) mod_security (id:210730) triggered by 47.128.36.153 (ec2-47-128-36-153.ap-southeast-1.compute.amazonaws.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Jan 12 17:43:21.496537 2025] [security2:error] [pid 625391:tid 625391] [client 47.128.36.153:22666] [client 47.128.36.153] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||www.civilwarzone.com|F|2"] [data ".dll"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "www.civilwarzone.com"] [uri "/~site/Scripts_ExternalRedirect/ExternalRedirect.dll"] [unique_id "Z4RFidZJ8AV-e-otp0PuEgAAAAM"], referer: http://www.civilwarzone.com/NathnielBanks.html show less
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
2025-01-11 04:46:34
(2 months ago)
Ports: 80,443; Direction: 1; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
hermawan
2025-01-10 10:00:52
(2 months ago)
[Fri Jan 10 13:33:54.467689 2025] [security2:error] [pid 50720:tid 123882664588992] [client 47.128.3 ... show more [Fri Jan 10 13:33:54.467689 2025] [security2:error] [pid 50720:tid 123882664588992] [client 47.128.36.153:33270] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "Feed" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/coreruleset-4.10.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "64"] [id "440000"] [msg "BAD BOT - Detected and Blocked"] [data "Matched Data: Feed found within REQUEST_HEADERS:User-Agent: Mozilla/5.0 (Linux; Android 5.0) AppleWebKit/537.36 (KHTML, like Gecko) Mobile Safari/537.36 (compatible; Bytespider; [email protected] ) request_line = GET /index.php/analisis-bulanan/160-analisis-distribusi-hujan/analisis-distribusi-curah-hujan/analisis-distribusi-curah-hujan-jawa-timur-bulanan/analisis-distribusi-curah-hujan-jawa-timur-bulanan-tahun-2009/324-analisis-distribusi-curah-hujan-jawa-timur-bulan-september-tahun-2009 HTTP..."] [severity "NOTICE"] [hostname "staklim-malang.info"] [uri "/index.php/analisis-bulanan/160-analisis-distri
... show less
Hacking
Web App Attack
Anonymous
2025-01-10 02:46:11
(2 months ago)
Ports: 80,443; Direction: 1; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
MAGIC
2025-01-06 03:01:03
(2 months ago)
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot