nowyouknow
2024-11-30 15:34:44
(1 week ago)
(From [email protected] ) Good Morning
I wanted to reach out and let you k ... show more (From [email protected] ) Good Morning
I wanted to reach out and let you know about our new dog harness. It's really easy to put on and take off - in just 2 seconds - and it's personalized for each dog.
Plus, we offer a lifetime warranty so you can be sure your pet is always safe and stylish.
We've had a lot of success with it so far and I think your dog would love it.
Get yours today with 50% OFF: https://caredogbest.com
FREE Shipping - TODAY ONLY!
Regards,
Ernie show less
Phishing
Web Spam
TPI-Abuse
2024-11-29 08:59:51
(1 week ago)
(mod_security) mod_security (id:217280) triggered by 5.62.49.88 (r-88-49-62-5.consumer-pool.prcdn.ne ... show more (mod_security) mod_security (id:217280) triggered by 5.62.49.88 (r-88-49-62-5.consumer-pool.prcdn.net): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri Nov 29 03:59:46.146539 2024] [security2:error] [pid 21555:tid 21564] [client 5.62.49.88:31688] [client 5.62.49.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\n|\\\\r)+(?:get|post|head|options|connect|put|delete|trace|propfind|propatch|mkcol|copy|move|lock|unlock)\\\\s+" at MATCHED_VAR. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/12_HTTP_Protocol.conf"] [line "137"] [id "217280"] [rev "6"] [msg "COMODO WAF: HTTP Request Smuggling Attack||www.howlerrock.com|F|2"] [data "Matched Data: put found within MATCHED_VAR"] [severity "CRITICAL"] [tag "CWAF"] [tag "Protocol"] [hostname "www.howlerrock.com"] [uri "/contact/"] [unique_id "Z0mCghehTRH-YgpxNkMdNAAAAQU"], referer: https://www.howlerrock.com/contact/ show less
Brute-Force
Bad Web Bot
Web App Attack
nowyouknow
2024-11-29 08:56:31
(1 week ago)
(From [email protected] ) Good Morning
I wanted to reach out and let you k ... show more (From [email protected] ) Good Morning
I wanted to reach out and let you know about our new dog harness. It's really easy to put on and take off - in just 2 seconds - and it's personalized for each dog.
Plus, we offer a lifetime warranty so you can be sure your pet is always safe and stylish.
We've had a lot of success with it so far and I think your dog would love it.
Get yours today with 50% OFF: https://caredogbest.com
FREE Shipping - TODAY ONLY!
Cheers,
Loyd show less
Phishing
Web Spam
diego
2024-11-28 03:56:51
(1 week ago)
Events: TCP SYN Discovery or Flooding, Seen 3 times in the last 10800 seconds
DDoS Attack
oonux.net
2024-11-26 18:48:13
(1 week ago)
RouterOS: The host 5.62.49.88 trying to use anonymous proxy
Hacking
Bad Web Bot
Exploited Host
oncord
2024-11-26 02:15:40
(1 week ago)
Form spam
Web Spam
MAGIC
2024-11-17 09:01:01
(3 weeks ago)
VM5 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot
nowyouknow
2024-11-17 07:43:37
(3 weeks ago)
(From [email protected] ) New Multifunction Waterproof Backpack
The best eve ... show more (From [email protected] ) New Multifunction Waterproof Backpack
The best ever SUPER Backpack: Drop-proof/Scratch-resistant/USB Charging/Large capacity storage
50% OFF for the next 24 Hours ONLY + FREE Worldwide Shipping for a LIMITED time
Buy now: https://thebackpack.biz
All the best,
Leonel show less
Phishing
Web Spam
backslash
2024-11-13 05:54:27
(3 weeks ago)
Web Spam
oncord
2024-11-12 15:24:49
(3 weeks ago)
Form spam
Web Spam
Anonymous
2024-10-03 06:38:03
(2 months ago)
| Multiple SQL injection attempts from same source ip.(multiple servers)
Hacking
SQL Injection
Web App Attack
hostseries
2024-09-30 13:42:17
(2 months ago)
Trigger: LF_IMAPD
Brute-Force
fortypoundhead
2024-09-27 08:16:33
(2 months ago)
SQL Injection Attempt
SQL Injection
Web App Attack
w-e-c-l-o-u-d-i-t
2024-08-07 22:19:50
(4 months ago)
(mod_security) mod_security (id:225170) triggered by 5.62.49.88 (US/United States/r-88-49-62-5.consu ... show more (mod_security) mod_security (id:225170) triggered by 5.62.49.88 (US/United States/r-88-49-62-5.consumer-pool.prcdn.net): 1 in the last 600 secs; Ports: *; Direction: 0; Trigger: LF_MODSEC show less
Brute-Force
SSH
TPI-Abuse
2024-08-03 19:05:31
(4 months ago)
(mod_security) mod_security (id:225170) triggered by 5.62.49.88 (r-88-49-62-5.consumer-pool.prcdn.ne ... show more (mod_security) mod_security (id:225170) triggered by 5.62.49.88 (r-88-49-62-5.consumer-pool.prcdn.net): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Aug 03 15:05:23.085299 2024] [security2:error] [pid 10381:tid 10429] [client 5.62.49.88:34786] [client 5.62.49.88] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||mateo-abogados.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "mateo-abogados.com"] [uri "/wp-json/wp/v2/users/"] [unique_id "Zq5_c6ZNx9DQqWy8FxF52AAAAAY"] show less
Brute-Force
Bad Web Bot
Web App Attack