Anonymous
2024-12-22 19:47:34
(3 weeks ago)
$f2bV_matches
Brute-Force
Gwyneth Llewelyn
2024-12-16 20:31:00
(3 weeks ago)
52.163.100.30 - - [16/Dec/2024:20:30:58 +0000] "GET /cgi-bin/about.php HTTP/2.0" 404 994 "-" "-"
Bad Web Bot
blinx
2024-12-16 13:51:14
(3 weeks ago)
Suspicious activity detected by Modsecurity
Web Spam
Port Scan
Hacking
Bad Web Bot
Web App Attack
Ba-Yu
2024-12-16 13:38:09
(3 weeks ago)
General hacking/exploits/scanning
Web Spam
Hacking
Brute-Force
Exploited Host
Web App Attack
Anonymous
2024-12-16 12:19:26
(3 weeks ago)
wordpress-trap
Web App Attack
Anonymous
2024-12-16 10:19:47
(3 weeks ago)
52.163.100.30 - - [16/Dec/2024:11:19:21 +0100] "GET /admin/function.php HTTP/1.1" 404 10971
52 ... show more 52.163.100.30 - - [16/Dec/2024:11:19:21 +0100] "GET /admin/function.php HTTP/1.1" 404 10971
52.163.100.30 - - [16/Dec/2024:11:19:23 +0100] "GET /admin.php HTTP/1.1" 404 10945
52.163.100.30 - - [16/Dec/2024:11:19:26 +0100] "GET /config.php HTTP/1.1" 404 10945
52.163.100.30 - - [16/Dec/2024:11:19:28 +0100] "GET /about/function.php HTTP/1.1" 404 10945
52.163.100.30 - - [16/Dec/2024:11:19:31 +0100] "GET /lock.php HTTP/1.1" 404 10945
52.163.100.30 - - [16/Dec/2024:11:19:33 +0100] "GET /simple.php HTTP/1.1" 404 10945
52.163.100.30 - - [16/Dec/2024:11:19:35 +0100] "GET /radio.php HTTP/1.1" 404 10945
52.163.100.30 - - [16/Dec/2024:11:19:39 +0100] "GET /alfa.php HTTP/1.1" 404 10971
52.163.100.30 - - [16/Dec/2024:11:19:42 +0100] "GET /text.php HTTP/1.1" 404 10945
52.163.100.30 - - [16/Dec/2024:11:19:44 +0100] "GET /autoload_classmap.php HTTP/1.1" 404 10945
... show less
Web Spam
Web App Attack
4server
2024-12-16 09:35:16
(3 weeks ago)
[MonDec1610:34:12.8408132024][security2:error][pid3478465:tid3478501][client52.163.100.30:0][client5 ... show more [MonDec1610:34:12.8408132024][security2:error][pid3478465:tid3478501][client52.163.100.30:0][client52.163.100.30]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch\"wp-content/uploads/.\*\\\\\\\\.ph\(\?:p\|tml\|t\)\"atREQUEST_FILENAME.[file\"/etc/apache2/conf.d/modsec_rules/99_asl_jitp.conf\"][line\"5062\"][id\"382238\"][rev\"2\"][msg\"Atomicorp.comWAFRules-VirtualJustInTimePatch:PHPfileexecutioninuploadsdirectorydenied\"][data\"wp-content/uploads/autoload_classmap.php\"][severity\"CRITICAL\"][hostname\"feldenkraisticino.ch\"][uri\"/wp-content/uploads/autoload_classmap.php\"][unique_id\"Z1_0FI8R75qNbdfzg4NXygAAAQc\"][MonDec1610:34:47.5536012024][security2:error][pid3477862:tid3477924][client52.163.100.30:0][client52.163.100.30]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch\"wp-content/uploads/.\*\\\\\\\\.ph\(\?:p\|tml\|t\)\"atREQUEST_FILENAME.[file\"/etc/apache2/conf.d/modsec_rules/99_asl_jitp.conf\"][line\"5062\"][id\"382238\"][rev\"2\"][msg\"Atomicorp.comWAFRules-VirtualJustInTimePatch:P show less
Port Scan
Brute-Force
Web App Attack
thesimonmanuel
2024-12-16 09:09:12
(3 weeks ago)
52.163.100.30 - - [16/Dec/2024:14:39:11 +0530] "GET /admin/function.php HTTP/1.1" 404 146 "-" "-" "- ... show more 52.163.100.30 - - [16/Dec/2024:14:39:11 +0530] "GET /admin/function.php HTTP/1.1" 404 146 "-" "-" "-"
52.163.100.30 - - [16/Dec/2024:14:39:11 +0530] "GET /admin.php HTTP/1.1" 404 146 "-" "-" "-"
52.163.100.30 - - [16/Dec/2024:14:39:11 +0530] "GET /config.php HTTP/1.1" 403 146 "-" "-" "-"
52.163.100.30 - - [16/Dec/2024:14:39:11 +0530] "GET /about/function.php HTTP/1.1" 404 146 "-" "-" "-"
52.163.100.30 - - [16/Dec/2024:14:39:12 +0530] "GET /lock.php HTTP/1.1" 404 146 "-" "-" "-" show less
Hacking
Web App Attack
Anonymous
2024-12-16 07:08:46
(3 weeks ago)
Ports: 80,443; Direction: 0; Trigger: LF_APACHE_403
Brute-Force
SSH
Mendip_Defender
2024-12-16 04:29:35
(3 weeks ago)
52.163.100.30 - - [16/Dec/2024:04:29:43 +0000] "GET /radio.php HTTP/1.0" 404 714 "-" "-"
52.16 ... show more 52.163.100.30 - - [16/Dec/2024:04:29:43 +0000] "GET /radio.php HTTP/1.0" 404 714 "-" "-"
52.163.100.30 - - [16/Dec/2024:04:29:43 +0000] "GET /wp-content/index.php HTTP/1.0" 404 971 "-" "-"
... show less
Hacking
Web App Attack
CryptoYakari
2024-12-16 02:37:09
(4 weeks ago)
52.163.100.30 - - [16/Dec/2024:05:37:07 +0300] "GET /admin/function.php HTTP/1.0" 404 7133 "-" "-"<b ... show more 52.163.100.30 - - [16/Dec/2024:05:37:07 +0300] "GET /admin/function.php HTTP/1.0" 404 7133 "-" "-"
52.163.100.30 - - [16/Dec/2024:05:37:07 +0300] "GET /admin.php HTTP/1.0" 404 526 "-" "-"
52.163.100.30 - - [16/Dec/2024:05:37:07 +0300] "GET /config.php HTTP/1.0" 404 526 "-" "-"
52.163.100.30 - - [16/Dec/2024:05:37:07 +0300] "GET /about/function.php HTTP/1.0" 404 3578 "-" "-"
52.163.100.30 - - [16/Dec/2024:05:37:07 +0300] "GET /lock.php HTTP/1.0" 404 526 "-" "-"
... show less
Web Spam
Blog Spam
Bad Web Bot
Web App Attack
conseilgouz
2024-12-16 01:49:49
(4 weeks ago)
lae-7 : Trying access unauthorized files/dir=>/wp-content/plugins/index.php
Hacking
hostseries
2024-12-16 01:36:55
(4 weeks ago)
Trigger: LF_MODSEC
Brute-Force
COMAITE
2024-12-15 23:05:11
(4 weeks ago)
Multiple web server 400 error codes from same source ip 52.163.100.30.
Web App Attack
Anonymous
2024-12-15 22:21:56
(4 weeks ago)
(mod_security) mod_security triggered on hostname [redacted] 52.163.100.30 (SG/Singapore/-)
SQL Injection