Savvii
|
|
10 attempts against mh-misc-ban on bean
|
Web App Attack
|
|
KIsmay
|
|
Oct 26 17:17:30 www4 WPAudit[3126215]: 84.17.46.141 www.bestnelson.org "Mozilla/5.0 (Windows NT 10.0 ... show moreOct 26 17:17:30 www4 WPAudit[3126215]: 84.17.46.141 www.bestnelson.org "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36" katietabor-developer:A�ERTY FAIL
Oct 26 17:17:31 www4 WPAudit[3126227]: 84.17.46.141 www.bestnelson.org "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36" katietabor-developer:a�erty FAIL
Oct 26 17:17:32 www4 WPAudit[3126215]: 84.17.46.141 www.bestnelson.org "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36" katietabor-developer:UGJRMV FAIL
Oct 26 17:17:33 www4 WPAudit[3126227]: 84.17.46.141 www.bestnelson.org "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36" katietabor-developer:ugjrmv FAIL
Oct 26 17:17:33 www4 WPAudit[3126215]: 84.17.46.141 www.bestnelson.org "Mozilla/5.0 (Windows NT 10.0; Win64; x64
... show less
|
Brute-Force
Web App Attack
|
|
Anonymous
|
|
Ports: *; Direction: 0; Trigger: CT_LIMIT
|
Brute-Force
SSH
|
|
mnsf
|
|
Too many Status 40X (16)
Request Overload (136)
|
Brute-Force
Web App Attack
|
|
vaia.cloud
|
|
trying wp-login.php/xmlrpc.php 51 times in 1 minutes
|
Brute-Force
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 84.17.46.141 (unn-84-17-46-141.cdn77.com): 1 in ... show more(mod_security) mod_security (id:225170) triggered by 84.17.46.141 (unn-84-17-46-141.cdn77.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Oct 26 15:12:29.383270 2024] [security2:error] [pid 3553:tid 3553] [client 84.17.46.141:34925] [client 84.17.46.141] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.campos.tv|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.campos.tv"] [uri "/wp-json/wp/v2/users/"] [unique_id "Zx0_Hc8OFy2xYrTvCJlZmwAAABw"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
MAGIC
|
|
VM1 Bad user agents ignoring web crawling rules. Draing bandwidth
|
DDoS Attack
Bad Web Bot
|
|
Dolphi
|
|
Excessive POST /wp-login.php requests
|
Brute-Force
Web App Attack
|
|
Anonymous
|
|
Malicious activity detected
|
Hacking
Brute-Force
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 84.17.46.141 (unn-84-17-46-141.cdn77.com): 1 in ... show more(mod_security) mod_security (id:225170) triggered by 84.17.46.141 (unn-84-17-46-141.cdn77.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Oct 26 14:37:26.984540 2024] [security2:error] [pid 20942:tid 20942] [client 84.17.46.141:34845] [client 84.17.46.141] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.kawkacevents.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.kawkacevents.com"] [uri "/wp-json/wp/v2/users/"] [unique_id "Zx025opjUm9wyhSQIQ-iWAAAAAc"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
Dolphi
|
|
POST //xmlrpc.php
|
Brute-Force
Web App Attack
|
|
TPI-Abuse
|
|
(mod_security) mod_security (id:225170) triggered by 84.17.46.141 (unn-84-17-46-141.cdn77.com): 1 in ... show more(mod_security) mod_security (id:225170) triggered by 84.17.46.141 (unn-84-17-46-141.cdn77.com): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Oct 26 13:55:44.696377 2024] [security2:error] [pid 9481:tid 9488] [client 84.17.46.141:34985] [client 84.17.46.141] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_COOKIES_NAMES. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/26_Apps_WordPress.conf"] [line "155"] [id "225170"] [rev "3"] [msg "COMODO WAF: Sensitive Information Disclosure Vulnerability in WordPress 4.7 (CVE-2017-5487)||www.alemarmedia.com|F|2"] [severity "CRITICAL"] [tag "CWAF"] [tag "WordPress"] [hostname "www.alemarmedia.com"] [uri "/wp-json/wp/v2/users/"] [unique_id "Zx0tICSNoihyI-S4ihGqHwAAAMU"] show less
|
Brute-Force
Bad Web Bot
Web App Attack
|
|
LRob.fr
|
|
WordPress login brute-force detected by Fail2Ban in plesk-wordpress jail
|
Brute-Force
Web App Attack
|
|
Anonymous
|
|
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
|
Brute-Force
SSH
|
|
VHosting
|
|
Attempt from 84.17.46.141, reason: FailedCaptchaVerify
|
DDoS Attack
Bad Web Bot
|
|