TPI-Abuse
2025-03-23 16:26:47
(3 days ago)
(mod_security) mod_security (id:210492) triggered by 5.255.98.151 (-): 1 in the last 300 secs; Ports ... show more (mod_security) mod_security (id:210492) triggered by 5.255.98.151 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Mar 23 12:26:42.516737 2025] [security2:error] [pid 15472:tid 15472] [client 5.255.98.151:36498] [client 5.255.98.151] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "wp-config.php" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "shamanichearthealingcenter.com"] [uri "/wp-config.php.maj"] [unique_id "Z-A2QjrQp8wOOiOyeHdHaAAAAA4"] show less
Brute-Force
Bad Web Bot
Web App Attack
maxxsense
2025-03-22 08:23:15
(4 days ago)
(sshd) Failed SSH login from 5.255.98.151 (NL/The Netherlands/-)
Brute-Force
SSH
oncord
2025-03-12 11:07:38
(2 weeks ago)
Form spam
Web Spam
ThreatBook.io
2025-02-25 23:46:51
(1 month ago)
ThreatBook Intelligence: Zombie,Spam more details on https://threatbook.io/ip/5.255.98.151
SSH
Anonymous
2025-02-12 19:23:27
(1 month ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
advena
2025-02-08 18:31:04
(1 month ago)
5.255.98.151 (AS60404 LITESERVER) was intercepted at 2025-02-08T18:23:22Z after violating WAF direct ... show more 5.255.98.151 (AS60404 LITESERVER) was intercepted at 2025-02-08T18:23:22Z after violating WAF directive: c2a2f414a67c409f90cccb6c5bba0215. Pre-cautionary/corrective action applied: block. show less
Web Spam
Hacking
Brute-Force
Web App Attack
iNetWorker
2025-01-31 00:51:23
(1 month ago)
trolling for resource vulnerabilities
Web App Attack
TPI-Abuse
2025-01-23 06:32:11
(2 months ago)
(mod_security) mod_security (id:210492) triggered by 5.255.98.151 (-): 1 in the last 300 secs; Ports ... show more (mod_security) mod_security (id:210492) triggered by 5.255.98.151 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Thu Jan 23 01:32:05.471168 2025] [security2:error] [pid 2831:tid 2831] [client 5.255.98.151:38500] [client 5.255.98.151] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "wp-config.php" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "bigheartskitchen.net"] [uri "/wp-config.php_old2023"] [unique_id "Z5HiZTj9R9SUAw4muAG2XQAAAAI"] show less
Brute-Force
Bad Web Bot
Web App Attack
london2038.com
2025-01-20 17:43:49
(2 months ago)
Detected by WP fail2ban
2025-01-20T18:43:48.069056+01:00 wordpress: Authentication attempt fro ... show more Detected by WP fail2ban
2025-01-20T18:43:48.069056+01:00 wordpress: Authentication attempt from 5.255.98.151 show less
Brute-Force
Web App Attack
TPI-Abuse
2025-01-16 23:58:27
(2 months ago)
(mod_security) mod_security (id:210730) triggered by 5.255.98.151 (-): 1 in the last 300 secs; Ports ... show more (mod_security) mod_security (id:210730) triggered by 5.255.98.151 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Thu Jan 16 18:58:21.580467 2025] [security2:error] [pid 2163545:tid 2163545] [client 5.255.98.151:37622] [client 5.255.98.151] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||antonyg.com|F|2"] [data ".sql"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "antonyg.com"] [uri "/daily.sql"] [unique_id "Z4mdHQXESE5vdftUQb4O-QAAAA0"] show less
Brute-Force
Bad Web Bot
Web App Attack
Brent Wadleigh
2025-01-09 17:50:46
(2 months ago)
IP attempted SSH bruteforce on port 22. Detected and banned by CrowdSec.
Brute-Force
SSH
it.inpglobal.com
2025-01-07 18:29:58
(2 months ago)
$f2bV_matches
Brute-Force
SSH
David Ferneding
2025-01-04 19:32:23
(2 months ago)
Part of large-scale ddos-attack, 57340 requests from this ip
DDoS Attack
TPI-Abuse
2024-12-21 21:11:04
(3 months ago)
(mod_security) mod_security (id:210730) triggered by 5.255.98.151 (-): 1 in the last 300 secs; Ports ... show more (mod_security) mod_security (id:210730) triggered by 5.255.98.151 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Dec 21 16:11:00.429479 2024] [security2:error] [pid 263408:tid 263408] [client 5.255.98.151:34896] [client 5.255.98.151] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||kh6jim.com|F|2"] [data ".sql"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "kh6jim.com"] [uri "/jim.sql"] [unique_id "Z2cu5Nf0qwSeMxZrd60HIAAAABk"] show less
Brute-Force
Bad Web Bot
Web App Attack
paissangroup
2024-12-19 01:27:43
(3 months ago)
Multiple WAF Violations
Web App Attack