statistics indonesia
2025-03-24 11:29:40
(7 hours ago)
WP Admin Scan Activities
Web App Attack
oncord
2025-03-22 19:55:59
(1 day ago)
Form spam
Web Spam
MAGIC
2025-03-22 05:02:26
(2 days ago)
VM5 Bad user agents ignoring web crawling rules. Draing bandwidth
DDoS Attack
Bad Web Bot
oncord
2025-03-19 20:25:22
(4 days ago)
Form spam
Web Spam
Packets-Decreaser.NET
2025-03-17 22:45:37
(6 days ago)
Incoming Layer 7 Flood Detected
DDoS Attack
Web Spam
backslash
2025-03-17 05:45:08
(1 week ago)
block ruleset Badbot using very old user-agents 5CF3CDB778C7D82564405B86B9242E612F378C68
Bad Web Bot
Progetto1
2025-03-15 12:05:02
(1 week ago)
Mail - Multiple failed login attempts
Brute-Force
Exploited Host
oncord
2025-03-15 05:58:33
(1 week ago)
Form spam
Web Spam
Vegascosmetics
2025-03-09 22:51:53
(2 weeks ago)
Kingcopy(AI-IDS): IP is wandering around the site and acting suspiciously.
Bad Web Bot
TPI-Abuse
2025-03-07 02:43:25
(2 weeks ago)
(mod_security) mod_security (id:210730) triggered by 84.16.224.227 (-): 1 in the last 300 secs; Port ... show more (mod_security) mod_security (id:210730) triggered by 84.16.224.227 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Thu Mar 06 21:43:19.015259 2025] [security2:error] [pid 10512:tid 10512] [client 84.16.224.227:52840] [client 84.16.224.227] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||sahinozalit.com|F|2"] [data ".sql"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "sahinozalit.com"] [uri "/installer-data.sql"] [unique_id "Z8pdR8jjPcn6BfCQ_J6QhgAAAAI"] show less
Brute-Force
Bad Web Bot
Web App Attack
subnetprotocol
2025-03-06 19:03:43
(2 weeks ago)
06/Mar/2025:20:03:41.911637 +0100Apache-Error: [file "apache2_util.c"] [line 275] [level 3] [client ... show more 06/Mar/2025:20:03:41.911637 +0100Apache-Error: [file "apache2_util.c"] [line 275] [level 3] [client 84.16.224.227] ModSecurity: Warning. Pattern match "(?:(?:\\\\\\\\(|\\\\\\\\[)[a-zA-Z0-9_.$\\\\"'\\\\\\\\[\\\\\\\\](){}/*\\\\\\\\s]+(?:\\\\\\\\)|\\\\\\\\])[0-9_.$\\\\"'\\\\\\\\[\\\\\\\\](){}/*\\\\\\\\s]*\\\\\\\\([a-zA-Z0-9_.$\\\\"'\\\\\\\\[\\\\\\\\](){}/*\\\\\\\\s].*\\\\\\\\)|\\\\\\\\([\\\\\\\\s]*string[\\\\\\\\s]*\\\\\\\\)[\\\\\\\\s]*(?:\\\\"|'))" at ARGS:user_password. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf"] [line "503"] [id "933210"] [msg "PHP Injection Attack: Variable Function Call Found"] [data "Matched Data: (SELECT (CHAR(113) CHAR(113) CHAR(113) CHAR(98) CHAR(113) (SELECT (CASE WHEN (8684=8684) THEN CHAR(49) ELSE CHAR(48) END)) CHAR(113) CHAR(122) CHAR(98) CHAR(106) CHAR(113))) found within ARGS:user_password: EQsG') AND 8684 IN (SELECT (CHAR(113) CHAR(113) CHAR(113) CHAR(98) CHAR(113) (SELECT (CASE WHEN (8684=8684)
... show less
Hacking
Web App Attack
oncord
2025-03-06 09:55:07
(2 weeks ago)
Form spam
Web Spam
subnetprotocol
2025-03-06 09:38:40
(2 weeks ago)
06/Mar/2025:10:38:30.830628 +0100Apache-Error: [file "apache2_util.c"] [line 275] [level 3] [client ... show more 06/Mar/2025:10:38:30.830628 +0100Apache-Error: [file "apache2_util.c"] [line 275] [level 3] [client 84.16.224.227] ModSecurity: Warning. detected SQLi using libinjection with fingerprint 'sUE1,' [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "66"] [id "942100"] [msg "SQL Injection Attack Detected via libinjection"] [data "Matched Data: sUE1, found within ARGS:taille1: -6280' UNION ALL SELECT 42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,42,..."] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [t
... show less
Hacking
Web App Attack
subnetprotocol
2025-03-06 07:16:02
(2 weeks ago)
06/Mar/2025:08:15:52.231762 +0100Apache-Error: [file "apache2_util.c"] [line 275] [level 3] [client ... show more 06/Mar/2025:08:15:52.231762 +0100Apache-Error: [file "apache2_util.c"] [line 275] [level 3] [client 84.16.224.227] ModSecurity: Warning. detected SQLi using libinjection with fingerprint 'sUEv,' [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "66"] [id "942100"] [msg "SQL Injection Attack Detected via libinjection"] [data "Matched Data: sUEv, found within ARGS:taille1: -5812' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NUL..."] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [t
... show less
Hacking
Web App Attack
subnetprotocol
2025-03-05 12:41:10
(2 weeks ago)
05/Mar/2025:13:41:08.006531 +0100Apache-Error: [file "apache2_util.c"] [line 275] [level 3] [client ... show more 05/Mar/2025:13:41:08.006531 +0100Apache-Error: [file "apache2_util.c"] [line 275] [level 3] [client 84.16.224.227] ModSecurity: Warning. Pattern match "(?i)(?:;|\\\\\\\\{|\\\\\\\\||\\\\\\\\|\\\\\\\\||&|&&|\\\\\\\\n|\\\\\\\\r|`)\\\\\\\\s*[\\\\\\\\(,@\\\\\\\\'\\\\"\\\\\\\\s]*(?:[\\\\\\\\w'\\\\"\\\\\\\\./]+/|[\\\\\\\\\\\\\\\\'\\\\"\\\\\\\\^]*\\\\\\\\w[\\\\\\\\\\\\\\\\'\\\\"\\\\\\\\^]*:.*\\\\\\\\\\\\\\\\|[\\\\\\\\^\\\\\\\\.\\\\\\\\w '\\\\"/\\\\\\\\\\\\\\\\]*\\\\\\\\\\\\\\\\)?[\\\\"\\\\\\\\^]*(?:s[\\\\"\\\\\\\\^]*(?:y[\\\\"\\\\\\\\^]*s[\\\\"\\\\\\\\^]*(?:t[\\\\"\\\\\\\\^]*e[\\\\"\\\\\\\\^]*m[\\\\"\\\\\\\\^]*(?:p[\\\\"\\\\\\\\^]*r[\\\\"\\\\\\\\^]*o[\\\\"\\\\\\\\^]*p[\\\\"\\\\\\\\^]*e ..." at ARGS:tri. [file "/etc/apache2/conf.d/modsec_vendor_configs/OWASP3/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf"] [line "295"] [id "932115"] [msg "Remote Command Execution: Windows Command Injection"] [data "Matched Data: ||(SELECT found within ARGS:tri: genre AND 4240=CAST((CHR(113)||CHR(118)||CHR(107)|
... show less
Hacking
Web App Attack