TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent ... show more(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 23:18:51.730319 2024] [security2:error] [pid 26652:tid 26672] [client 78.141.200.197:56668] [client 78.141.200.197] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.southtampaprints.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.southtampaprints.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "ZzA0K2zaIDS9S3SIs-hYIQAAABI"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent ... show more(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 22:50:35.322290 2024] [security2:error] [pid 1781058:tid 1781058] [client 78.141.200.197:43278] [client 78.141.200.197] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.alecmcatee.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.alecmcatee.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "ZzAti44JdUEIwXnUQ1nm4AAAAA8"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent ... show more(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 21:33:46.286438 2024] [security2:error] [pid 1027:tid 1027] [client 78.141.200.197:51640] [client 78.141.200.197] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.athletefirst.org|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.athletefirst.org"] [uri "/_users/org.couchdb.user:poc"] [unique_id "ZzAbik90ykPN3Qh1nu52_QAAAAg"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent ... show more(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 20:45:49.394177 2024] [security2:error] [pid 6142:tid 6142] [client 78.141.200.197:38090] [client 78.141.200.197] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.ageiron.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.ageiron.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "ZzAQTQE2qoblIPTo1m-1ggAAAAI"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent ... show more(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 20:22:23.077290 2024] [security2:error] [pid 2040993:tid 2040993] [client 78.141.200.197:45784] [client 78.141.200.197] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.affordablehomegoods.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.affordablehomegoods.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "ZzAKz8SbOgYAufdy9nucxQAAAAA"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent ... show more(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 19:35:42.789642 2024] [security2:error] [pid 1474:tid 1474] [client 78.141.200.197:41720] [client 78.141.200.197] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.adonamusic.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.adonamusic.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "Zy__3g-aYSfhs5gudNc6VAAAAAc"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent ... show more(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 18:38:19.043900 2024] [security2:error] [pid 4554:tid 4554] [client 78.141.200.197:37800] [client 78.141.200.197] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.sharonmauldin.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.sharonmauldin.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "Zy_ya3UiLbGcH-svE3P4igAAAAI"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent ... show more(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 17:48:44.996045 2024] [security2:error] [pid 21600:tid 21600] [client 78.141.200.197:33016] [client 78.141.200.197] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.abilityengraving.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.abilityengraving.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "Zy_mzEdXIZgHKwvXwGfjUQAAAAc"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent ... show more(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 17:32:24.876706 2024] [security2:error] [pid 1548:tid 1548] [client 78.141.200.197:34022] [client 78.141.200.197] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.serconpri.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.serconpri.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "Zy_i-KBwM8L3vpe6fOxlgwAAAAI"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent ... show more(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 16:07:42.975944 2024] [security2:error] [pid 20641:tid 20641] [client 78.141.200.197:58644] [client 78.141.200.197] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.415test.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.415test.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "Zy_PHkowzUKiqmtmexte3wAAAAI"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent ... show more(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 14:49:13.870703 2024] [security2:error] [pid 5646:tid 5673] [client 78.141.200.197:56760] [client 78.141.200.197] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.garyjahrig.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.garyjahrig.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "Zy-8uSpxJd3_A7ShYasI6QAAAFU"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent ... show more(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 14:19:13.211301 2024] [security2:error] [pid 19429:tid 19429] [client 78.141.200.197:39332] [client 78.141.200.197] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.saltcityprint.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.saltcityprint.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "Zy-1sUSDbiAIakjMEnEfgQAAAAs"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent ... show more(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 13:20:18.752928 2024] [security2:error] [pid 12684:tid 12684] [client 78.141.200.197:35022] [client 78.141.200.197] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.ruthbalser.org|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.ruthbalser.org"] [uri "/_users/org.couchdb.user:poc"] [unique_id "Zy-n4lNOrSK5aVjgK3vJ4gAAABY"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent ... show more(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 12:43:53.952949 2024] [security2:error] [pid 16902:tid 16902] [client 78.141.200.197:53462] [client 78.141.200.197] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4530"] [id "240950"] [rev "2"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.frenchla.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.frenchla.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "Zy-fWYcTI3oZvFBT6ITUqAAAAAE"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent ... show more(mod_security) mod_security (id:240950) triggered by 78.141.200.197 (78.141.200.197.vultrusercontent.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 11:56:15.410701 2024] [security2:error] [pid 2625359:tid 2625359] [client 78.141.200.197:58208] [client 78.141.200.197] ModSecurity: Access denied with code 403 (phase 1). Pattern match "\\\\D" at TX:1. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/30_Apps_OtherApps.conf"] [line "4539"] [id "240950"] [rev "1"] [msg "COMODO WAF: XSS & SQL injection vulnerability in Pragyan CMS 3.0 (CVE-2015-1471)||cpanel.forwardti.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "OtherApps"] [hostname "cpanel.forwardti.com"] [uri "/_users/org.couchdb.user:poc"] [unique_id "Zy-UL7n3cgMuT1hp2nBXDwAAAAk"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|