10dencehispahard SL
14 May 2022
Suspicious activity detected by Modsecurity [Application attack LFI]
Hacking
Web App Attack
Might Man
14 May 2022
h
Hacking
Exploited Host
Web App Attack
SvrAdmin
14 May 2022
TIME: Sat, 14 May 2022 12:17:33 -0300
REQUEST: /.env
Bad Web Bot
Exploited Host
Web App Attack
Epimetheus
14 May 2022
Unauthorized access attempts:
From:
51.142.154.171
Method:
H ... show more Unauthorized access attempts:
From:
51.142.154.171
Method:
HTTPS GET
URI Path:
/.env
UA:
"python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-1160.53.1.el7.x86_64" show less
Web App Attack
el-brujo
14 May 2022
14/May/2022:12:42:27 +0200Apache-Error: [file "apache2_util.c"] [line 273] [level 3] [client 51.142. ... show more 14/May/2022:12:42:27 +0200Apache-Error: [file "apache2_util.c"] [line 273] [level 3] [client 51.142.154.171] ModSecurity: Warning. Matched phrase "/.env" at REQUEST_FILENAME. [file "/etc/httpd/modsecurity.d/activated_rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "124"] [id "930130"] [msg "Restricted File Access Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/255/153/126"] [tag "PCI/6.5.4"] [hostname "oriolhostench.net"] [uri "/.env"] [unique_id "[email protected] "]
... show less
Hacking
Web App Attack
Mediashaker
14 May 2022
(apache-scanners) Failed apache-scanners trigger with match [redacted] from 51.142.154.171 (GB/Unite ... show more (apache-scanners) Failed apache-scanners trigger with match [redacted] from 51.142.154.171 (GB/United Kingdom/-) show less
Port Scan
gwynethllewelyn.net
14 May 2022
2022/05/14 10:02:49 [error] 326153#326153: *658008 access forbidden by rule, client: 51.142.154.171, ... show more 2022/05/14 10:02:49 [error] 326153#326153: *658008 access forbidden by rule, client: 51.142.154.171, server: bestasquadradas.org, request: "GET /.env HTTP/2.0", host: "bestasquadradas.org"
2022/05/14 10:02:49 [error] 326153#326153: *658014 access forbidden by rule, client: 51.142.154.171, server: bestasquadradas.org, request: "GET /.env HTTP/2.0", host: "bestasquadradas.org"
51.142.154.171 - - [14/May/2022:10:02:49 +0100] "GET /.env HTTP/2.0" 403 1166 "-" "python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-1160.53.1.el7.x86_64"
... show less
Web App Attack
SvrAdmin
14 May 2022
TIME: Sat, 14 May 2022 05:21:34 -0300
REQUEST: /.env
Bad Web Bot
Exploited Host
Web App Attack
Maykson
14 May 2022
51.142.154.171 - - [14/May/2022:03:06:38 -0300] "GET /.env HTTP/1.1" 403 433 "-" "python-requests/2. ... show more 51.142.154.171 - - [14/May/2022:03:06:38 -0300] "GET /.env HTTP/1.1" 403 433 "-" "python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-1160.53.1.el7.x86_64"
... show less
Exploited Host
Web App Attack
el-brujo
14 May 2022
14/May/2022:07:44:29 +0200Apache-Error: [file "apache2_util.c"] [line 273] [level 3] [client 51.142. ... show more 14/May/2022:07:44:29 +0200Apache-Error: [file "apache2_util.c"] [line 273] [level 3] [client 51.142.154.171] ModSecurity: Warning. Matched phrase "/.env" at REQUEST_FILENAME. [file "/etc/httpd/modsecurity.d/activated_rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "124"] [id "930130"] [msg "Restricted File Access Attempt"] [data "Matched Data: /.env found within REQUEST_FILENAME: /.env"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/255/153/126"] [tag "PCI/6.5.4"] [hostname "ns2.elhacker.net"] [uri "/.env"] [unique_id "Yn9BvZYj1GER4LzjMwsXogAAAE4"]
... show less
Hacking
Web App Attack
Epimetheus
13 May 2022
Unauthorized access attempts:
From:
51.142.154.171
Method:
H ... show more Unauthorized access attempts:
From:
51.142.154.171
Method:
HTTP GET
URI Path:
/.env
UA:
"python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-1160.53.1.el7.x86_64" show less
Web App Attack
Ba-Yu
13 May 2022
General hacking/exploits/scanning
Web Spam
Hacking
Brute-Force
Exploited Host
Web App Attack
gwynethllewelyn.net
13 May 2022
51.142.154.171 - - [14/May/2022:02:54:57 +0100] "GET /.env HTTP/2.0" 301 162 "-" "python-requests/2. ... show more 51.142.154.171 - - [14/May/2022:02:54:57 +0100] "GET /.env HTTP/2.0" 301 162 "-" "python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-1160.53.1.el7.x86_64"
2022/05/14 02:54:57 [error] 326155#326155: *72432 access forbidden by rule, client: 51.142.154.171, server: bestasquadradas.org, request: "GET /.env HTTP/2.0", host: "bestasquadradas.org"
51.142.154.171 - - [14/May/2022:02:54:57 +0100] "GET /.env HTTP/2.0" 403 1166 "-" "python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-1160.53.1.el7.x86_64"
... show less
Web App Attack
Epimetheus
13 May 2022
Unauthorized access attempts:
From:
51.142.154.171
Method:
H ... show more Unauthorized access attempts:
From:
51.142.154.171
Method:
HTTPS GET
URI Path:
/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
UA:
"python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-1160.53.1.el7.x86_64" show less
Web App Attack