spam or other hacking activities reported by webbfabriken security servers
Attack reported by ... show morespam or other hacking activities reported by webbfabriken security servers
Attack reported by Webbfabiken Security API - WFSecAPI show less
Detected abusive req: GET / User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 ... show moreDetected abusive req: GET / User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36. Reason: AID hint show less
9 unauthorized connection attempts to port 80
HTTP GET to / from 68[.]183[.]84[.]40:52690 - 20 ... show more9 unauthorized connection attempts to port 80
HTTP GET to / from 68[.]183[.]84[.]40:52690 - 2024-09-10T17:53:01
HTTP GET to /form[.]html from 68[.]183[.]84[.]40:53360 - 2024-09-10T17:53:03
HTTP GET to /upl[.]php from 68[.]183[.]84[.]40:53372 - 2024-09-10T17:53:04
HTTP GET to /t4 from 68[.]183[.]84[.]40:53384 - 2024-09-10T17:53:06
HTTP GET to /geoip/ from 68[.]183[.]84[.]40:53388 - 2024-09-10T17:53:07
HTTP GET to /favicon[.]ico from 68[.]183[.]84[.]40:53390 - 2024-09-10T17:53:07
HTTP GET to /1[.]php from 68[.]183[.]84[.]40:53396 - 2024-09-10T17:53:09
HTTP GET to /systembc/password[.]php from 68[.]183[.]84[.]40:53408 - 2024-09-10T17:53:10 show less
Probed for vulnerable web application: request line: /ab2g (Possible exploit:Scanning for Cobalt Str ... show moreProbed for vulnerable web application: request line: /ab2g (Possible exploit:Scanning for Cobalt Strike C2 server) show less
[AUTORAVALT][[09/09/2024 - 16:27:57 -03:00 UTC]
Attack from [DigitalOcean, LLC]
[68.183. ... show more[AUTORAVALT][[09/09/2024 - 16:27:57 -03:00 UTC]
Attack from [DigitalOcean, LLC]
[68.183.84.40] Action: BLocKed
Bad Web Bot -> Webpage scraping (email extraction, content, etc.) crawlers that do not respect robots.txt. Excessive requests and user agent spoofing.
]
... show less