octageeks.com
2025-04-30 04:08:10
(1 week ago)
Wordpress malicious attack:[octablocked]
Web App Attack
maza
2025-04-29 01:01:35
(1 week ago)
Malicious activity detected from 8560 IONOS-AS This is the joint network for IONOS, Fasthosts, Arsys ... show more Malicious activity detected from 8560 IONOS-AS This is the joint network for IONOS, Fasthosts, Arsys, 1&1 Mail and Media and 1&1 Telecom. Formerly known as 1&1 Internet SE. towards host alterminds.xyz (GET HTTP/1.1) @ 2025-04-29T01:01:35Z show less
Open Proxy
VPN IP
Port Scan
Hacking
SQL Injection
Bad Web Bot
Exploited Host
Web App Attack
el-brujo
2025-04-29 00:16:50
(1 week ago)
Cloudflare WAF: Request Path: /wp-config.php.save Request Query: Host: wiki.elhacker.net userAgent: ... show more Cloudflare WAF: Request Path: /wp-config.php.save Request Query: Host: wiki.elhacker.net userAgent: Action: block Source: firewallManaged ASN Description: IONOS-AS This is the joint network for IONOS, Fasthosts, Arsys, 1&1 Mail and Media and 1&1 Telecom. Formerly known as 1&1 Internet SE. Country: US Method: GET Timestamp: 2025-04-29T00:16:50Z ruleId: 7994335d116849f7a0ab6b771d1d0db7. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/MHG-LAB/Cloudflare-WAF-to-AbuseIPDB). show less
Hacking
SQL Injection
Web App Attack
TPI-Abuse
2025-04-29 00:07:59
(1 week ago)
(mod_security) mod_security (id:210492) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in t ... show more (mod_security) mod_security (id:210492) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Apr 28 20:07:56.136490 2025] [security2:error] [pid 3856:tid 3856] [client 74.208.59.124:33890] [client 74.208.59.124] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "wp-config.php" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "willymoc.com"] [uri "/wp-config.php.orig"] [unique_id "aBAYXMrkPJA-GELQuv5jjgAAADM"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2025-04-28 21:18:08
(1 week ago)
(mod_security) mod_security (id:210492) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in t ... show more (mod_security) mod_security (id:210492) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Apr 28 17:18:03.976020 2025] [security2:error] [pid 8030:tid 8030] [client 74.208.59.124:47540] [client 74.208.59.124] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "wp-config.php" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "lertap5.com"] [uri "/wp-config.php.orig"] [unique_id "aA_wi5-A7qwaxHVaKwiknQAAABI"] show less
Brute-Force
Bad Web Bot
Web App Attack
ipblock.com
2025-04-28 20:53:00
(1 week ago)
IPBlock protected site ID [4730-fr].
Exploit request, vulnerability scanner.
Hacking
Bad Web Bot
Web App Attack
TPI-Abuse
2025-04-28 07:29:55
(2 weeks ago)
(mod_security) mod_security (id:210492) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in t ... show more (mod_security) mod_security (id:210492) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Apr 28 03:29:50.811520 2025] [security2:error] [pid 16419:tid 16419] [client 74.208.59.124:50984] [client 74.208.59.124] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "wp-config.php" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "plumduff.microdot.net"] [uri "/wp-config.php.orig"] [unique_id "aA8ubtyxfIouSdZysUEB3wAAAAQ"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2025-04-27 09:38:53
(2 weeks ago)
(mod_security) mod_security (id:210492) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in t ... show more (mod_security) mod_security (id:210492) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Apr 27 05:38:47.868472 2025] [security2:error] [pid 6020:tid 6020] [client 74.208.59.124:37890] [client 74.208.59.124] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "wp-config.php" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "120"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "teenybikini.com"] [uri "/wp-config.php.orig"] [unique_id "aA37J0S0OjT8dGsEXO-Z-QAAAAw"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2025-04-27 08:05:11
(2 weeks ago)
(mod_security) mod_security (id:210492) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in t ... show more (mod_security) mod_security (id:210492) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Apr 27 04:05:07.629277 2025] [security2:error] [pid 3735779:tid 3735779] [client 74.208.59.124:34610] [client 74.208.59.124] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "wp-config.php" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "120"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "weismanovens.com"] [uri "/wp-config.php.orig"] [unique_id "aA3lM-lLWzjz3kpNdJ3g9wAAAAQ"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2025-04-25 19:43:35
(2 weeks ago)
(mod_security) mod_security (id:210492) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in t ... show more (mod_security) mod_security (id:210492) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri Apr 25 15:43:31.309310 2025] [security2:error] [pid 1984441:tid 1984441] [client 74.208.59.124:53958] [client 74.208.59.124] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "wp-config.php" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "davisllp.com"] [uri "/wp-config.php.bkp"] [unique_id "aAvl49myL5RpZe0hzZS1xwAAABE"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2025-04-25 09:17:38
(2 weeks ago)
(mod_security) mod_security (id:210492) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in t ... show more (mod_security) mod_security (id:210492) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri Apr 25 05:17:33.895461 2025] [security2:error] [pid 368250:tid 368250] [client 74.208.59.124:43898] [client 74.208.59.124] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "wp-config.bak" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "drgas.com"] [uri "/wp-config.bak"] [unique_id "aAtTLYD-CZ8tYCFkruBDrQAAAA8"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2025-04-24 01:47:48
(2 weeks ago)
(mod_security) mod_security (id:210730) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in t ... show more (mod_security) mod_security (id:210730) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Wed Apr 23 21:47:38.049612 2025] [security2:error] [pid 22805:tid 22805] [client 74.208.59.124:60758] [client 74.208.59.124] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||brookspowell.com|F|2"] [data ".backup"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "brookspowell.com"] [uri "/wp-config.backup"] [unique_id "aAmYOnEjgBn13W6Z3QwzHwAAAA8"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2025-04-23 20:02:18
(2 weeks ago)
(mod_security) mod_security (id:210492) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in t ... show more (mod_security) mod_security (id:210492) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Wed Apr 23 16:02:12.098980 2025] [security2:error] [pid 2633486:tid 2633486] [client 74.208.59.124:45050] [client 74.208.59.124] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "wp-config.php" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "wedemandavote.com"] [uri "/wp-config.php.backup"] [unique_id "aAlHRGZ7ZAy2f85BCql9HwAAAAE"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2025-04-23 14:17:32
(2 weeks ago)
(mod_security) mod_security (id:210730) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in t ... show more (mod_security) mod_security (id:210730) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Wed Apr 23 10:17:27.704402 2025] [security2:error] [pid 22105:tid 22105] [client 74.208.59.124:42016] [client 74.208.59.124] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||lapsychiatrist.com|F|2"] [data ".backup"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "lapsychiatrist.com"] [uri "/wp-config.backup"] [unique_id "aAj2d38XyANOrGelKgW4cAAAAAk"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2025-04-23 09:24:29
(2 weeks ago)
(mod_security) mod_security (id:210730) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in t ... show more (mod_security) mod_security (id:210730) triggered by 74.208.59.124 (infong-us23.perfora.net): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Wed Apr 23 05:24:25.611545 2025] [security2:error] [pid 17855:tid 17981] [client 74.208.59.124:52606] [client 74.208.59.124] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||wedgwoodclub.com|F|2"] [data ".backup"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "wedgwoodclub.com"] [uri "/wp-config.backup"] [unique_id "aAixyf_2IE4g0KdpDnrnYgAAAEk"] show less
Brute-Force
Bad Web Bot
Web App Attack