oncord
2025-02-10 10:35:43
(2 days ago)
Form spam
Web Spam
maximonline.co.za
2025-02-10 00:57:03
(3 days ago)
Contact form spam.
Web Spam
Progetto1
2025-02-09 15:55:02
(3 days ago)
Website Scanning / Scraping
Bad Web Bot
Exploited Host
Web App Attack
oncord
2025-02-09 00:36:57
(4 days ago)
Form spam
Web Spam
Anonymous
2025-02-08 21:06:26
(4 days ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
conseilgouz
2025-02-08 01:56:46
(5 days ago)
sae-7 : Trying access unauthorized files/dir=>/wp-content/uploads/
Hacking
zynex
2025-02-06 12:06:49
(6 days ago)
URL Probing: /function.php
Web App Attack
oncord
2025-02-06 02:11:36
(6 days ago)
Form spam
Web Spam
oncord
2025-02-05 00:59:16
(1 week ago)
Form spam
Web Spam
TPI-Abuse
2025-02-03 18:27:47
(1 week ago)
(mod_security) mod_security (id:210492) triggered by 89.213.226.7 (-): 1 in the last 300 secs; Ports ... show more (mod_security) mod_security (id:210492) triggered by 89.213.226.7 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Feb 03 13:27:41.961718 2025] [security2:error] [pid 2390211:tid 2390211] [client 89.213.226.7:48849] [client 89.213.226.7] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "/sftp-config.json" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "fxztrader.com"] [uri "/sftp-config.json"] [unique_id "Z6EKnTyk1DNamt1HhIBNrQAAAAM"] show less
Brute-Force
Bad Web Bot
Web App Attack
oncord
2025-02-02 10:10:59
(1 week ago)
Form spam
Web Spam
TPI-Abuse
2025-01-26 18:29:11
(2 weeks ago)
(mod_security) mod_security (id:210730) triggered by 89.213.226.7 (-): 1 in the last 300 secs; Ports ... show more (mod_security) mod_security (id:210730) triggered by 89.213.226.7 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sun Jan 26 13:29:05.080306 2025] [security2:error] [pid 955:tid 955] [client 89.213.226.7:6075] [client 89.213.226.7] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||russiacoin.info|F|2"] [data ".sql"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "russiacoin.info"] [uri "/back/dump.sql"] [unique_id "Z5Z-8dW2-8g80VPuGGMxAAAAABQ"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2025-01-24 19:55:31
(2 weeks ago)
(mod_security) mod_security (id:210730) triggered by 89.213.226.7 (-): 1 in the last 300 secs; Ports ... show more (mod_security) mod_security (id:210730) triggered by 89.213.226.7 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri Jan 24 14:55:25.586885 2025] [security2:error] [pid 11640:tid 11640] [client 89.213.226.7:38429] [client 89.213.226.7] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||bitcoinsubscribers.com|F|2"] [data ".sql"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "bitcoinsubscribers.com"] [uri "/sql.sql"] [unique_id "Z5PwLdm-QwVCN-9OtoSHXQAAAAM"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2025-01-24 14:14:37
(2 weeks ago)
(mod_security) mod_security (id:210730) triggered by 89.213.226.7 (-): 1 in the last 300 secs; Ports ... show more (mod_security) mod_security (id:210730) triggered by 89.213.226.7 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri Jan 24 09:14:32.354014 2025] [security2:error] [pid 30391:tid 30391] [client 89.213.226.7:1229] [client 89.213.226.7] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||www.mindtoken.app|F|2"] [data ".sql"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "www.mindtoken.app"] [uri "/back/sql.sql"] [unique_id "Z5OgSA28lhuf472sl4ne6wAAAAw"] show less
Brute-Force
Bad Web Bot
Web App Attack
oncord
2025-01-22 02:09:57
(3 weeks ago)
Form spam
Web Spam