Charles
2024-06-07 02:47:49
(6 months ago)
52.80.214.58 - - [07/Jun/2024:10:47:47 +0800] "GET /favicon.ico HTTP/1.1" 200 11996 "-" "Go-http-cli ... show more 52.80.214.58 - - [07/Jun/2024:10:47:47 +0800] "GET /favicon.ico HTTP/1.1" 200 11996 "-" "Go-http-client/1.1"
... show less
Web Spam
Email Spam
Brute-Force
Bad Web Bot
Web App Attack
SSH
Mehmet_The_Script_Kiddie
2024-06-05 02:14:20
(6 months ago)
GET /favicon.ico HTTP/1.1
Hacking
Bad Web Bot
kumiko
2024-05-31 12:55:28
(6 months ago)
[2024-05-31 12:55:27] Probing for exploits [1 requests]
"\x16\x03\x01\x01\x13\x01" 301
Brute-Force
Bad Web Bot
Web App Attack
CommanderRoot
2024-05-26 08:46:38
(6 months ago)
Invalid HTTP request flood
DDoS Attack
Web Spam
stvnrdg.me
2024-05-24 08:40:09
(6 months ago)
52.80.214.58 - - [24/May/2024:08:40:09 +0000] "GET /favicon.ico HTTP/1.1" 404 4659 "-" "Go-http-clie ... show more 52.80.214.58 - - [24/May/2024:08:40:09 +0000] "GET /favicon.ico HTTP/1.1" 404 4659 "-" "Go-http-client/1.1"
... show less
Bad Web Bot
Web App Attack
SaltySoftworks
2024-05-23 21:47:53
(6 months ago)
by Amazon Technologies Inc.
DDoS Attack
Web Spam
Hacking
Bad Web Bot
Web App Attack
london2038.com
2024-05-20 20:20:31
(6 months ago)
Malformed or malicious web request
52.80.214.58 - - [20/May/2024:22:20:26 +0200] "\x16\x03\x01 ... show more Malformed or malicious web request
52.80.214.58 - - [20/May/2024:22:20:26 +0200] "\x16\x03\x01\x01\x09\x01\x00\x01\x05\x03\x03R\x91\xD1V\x9A7\x0B\x82\x19\x97\xC64}Tz\xDA\x1A\xA1>\xB6q\x86i\xE6\x22\x11\xAB\x87\x85\xB2\xB7\xC3 \xE1=\xF8\xDAdL\xA8\xA7\x97m\x10'\xC2\xBF\xC4\x01\x82w\xEA\xC66]u\xD4\x90&jHU\x90sU\x00&\xC0+\xC0/\xC0,\xC00\xCC\xA9\xCC\xA8\xC0\x09\xC0\x13\xC0" 400 157 "-" "-" show less
Hacking
Web App Attack
advena
2024-05-19 04:15:56
(6 months ago)
52.80.214.58 (AS55960 BJ-GUANGHUAN-AP Beijing Guanghuan Xinwang Digital) was intercepted at 2024-05- ... show more 52.80.214.58 (AS55960 BJ-GUANGHUAN-AP Beijing Guanghuan Xinwang Digital) was intercepted at 2024-05-19T04:09:14Z after violating WAF directive: 874a3e315c344b1281ad4f00046aab6f. Pre-cautionary/corrective action applied: block. show less
Web Spam
Hacking
Brute-Force
Web App Attack
MHuiG
2024-05-17 16:08:20
(6 months ago)
The IP has triggered Cloudflare WAF. action: block source: firewallCustom clientAsn: 55960 clientASN ... show more The IP has triggered Cloudflare WAF. action: block source: firewallCustom clientAsn: 55960 clientASNDescription: BJ-GUANGHUAN-AP Beijing Guanghuan Xinwang Digital clientCountryName: CN clientIP: 52.80.214.58 clientRequestHTTPHost: mhuig.top clientRequestHTTPMethodName: GET clientRequestHTTPProtocol: HTTP/1.1 clientRequestPath: /robots.txt clientRequestQuery: datetime: 2024-05-17T15:34:05Z rayName: 8854ab6b2b2207b7 ruleId: 62370dc6b7504b8c983f836ea0faec20 userAgent: Go-http-client/1.1. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/MHG-LAB/Cloudflare-WAF-to-AbuseIPDB). show less
Open Proxy
VPN IP
Port Scan
Hacking
SQL Injection
Bad Web Bot
Exploited Host
Web App Attack
Anonymous
2024-05-14 16:04:01
(6 months ago)
fail2ban apache-modsecurity [msg "Inbound Anomaly Score Exceeded (Total Score: 5)"] [uri "/"]
Web App Attack
Anonymous
2024-05-13 16:59:26
(6 months ago)
52.80.214.58 - - \[14/May/2024:00:59:26 +0800\] \"GET /axis2-admin/ HTTP/1.1\" 404 5416 \"-\" \"Mozi ... show more 52.80.214.58 - - \[14/May/2024:00:59:26 +0800\] \"GET /axis2-admin/ HTTP/1.1\" 404 5416 \"-\" \"Mozilla/5.0 \(Windows NT 10.0\; WOW64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/83.0.4103.116 Safari/537.36\" show less
Web App Attack
MHuiG
2024-05-09 12:12:03
(7 months ago)
The IP has triggered Cloudflare WAF. action: block source: firewallCustom clientAsn: 55960 clientASN ... show more The IP has triggered Cloudflare WAF. action: block source: firewallCustom clientAsn: 55960 clientASNDescription: BJ-GUANGHUAN-AP Beijing Guanghuan Xinwang Digital clientCountryName: CN clientIP: 52.80.214.58 clientRequestHTTPHost: mhuig.top clientRequestHTTPMethodName: GET clientRequestHTTPProtocol: HTTP/1.1 clientRequestPath: /sitemap.xml clientRequestQuery: datetime: 2024-05-09T12:02:26Z rayName: 88118a64bafe9441 ruleId: 62370dc6b7504b8c983f836ea0faec20 userAgent: Go-http-client/1.1. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/MHG-LAB/Cloudflare-WAF-to-AbuseIPDB). show less
Open Proxy
VPN IP
Port Scan
Hacking
SQL Injection
Bad Web Bot
Exploited Host
Web App Attack
hbrks
2024-05-06 20:06:54
(7 months ago)
https://api.marche-be.com/ * statusCode: 400 * user-agent:DDOS Attack
Web Spam
Hacking
Bad Web Bot
MHuiG
2024-05-06 06:10:27
(7 months ago)
The IP has triggered Cloudflare WAF. action: block source: firewallCustom clientAsn: 55960 clientASN ... show more The IP has triggered Cloudflare WAF. action: block source: firewallCustom clientAsn: 55960 clientASNDescription: BJ-GUANGHUAN-AP Beijing Guanghuan Xinwang Digital clientCountryName: CN clientIP: 52.80.214.58 clientRequestHTTPHost: blog.mhuig.top clientRequestHTTPMethodName: GET clientRequestHTTPProtocol: HTTP/1.1 clientRequestPath: /sitemap.xml clientRequestQuery: datetime: 2024-05-06T04:55:19Z rayName: 87f660982b4315c2 ruleId: 62370dc6b7504b8c983f836ea0faec20 userAgent: Go-http-client/1.1. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/MHG-LAB/Cloudflare-WAF-to-AbuseIPDB). show less
Open Proxy
VPN IP
Port Scan
Hacking
SQL Injection
Bad Web Bot
Exploited Host
Web App Attack
10dencehispahard SL
2024-05-05 07:00:25
(7 months ago)
Unauthorized login attempts [ accesslogs]
Brute-Force