User elf joined AbuseIPDB in November 2023 and has reported 998 IP addresses.
Standing (weight) is good.
ACTIVE USER
WEBMASTER
IP | Date | Comment | Categories |
---|---|---|---|
![]() |
[Fail2Ban]: Jail apache-auth triggered 4 time(s) for 2a01:239:279:8600::1:0.
[Sat Jan 04 21:38 ... show more[Fail2Ban]: Jail apache-auth triggered 4 time(s) for 2a01:239:279:8600::1:0.
[Sat Jan 04 21:38:40.928581 2025] [authz_core:error] [pid 686560] [client 2a01:239:279:8600::1:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.env [Sat Jan 04 21:38:41.195684 2025] [authz_core:error] [pid 686644] [client 2a01:239:279:8600::1:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.env.local [Sat Jan 04 21:38:41.195684 2025] [authz_core:error] [pid 686644] [client 2a01:239:279:8600::1:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.env.local ... show less |
Brute-Force Web App Attack | |
![]() |
[Fail2Ban]: Jail apache-auth triggered 5 time(s) for 109.202.99.36.
[Sat Jan 04 19:55:01.67873 ... show more[Fail2Ban]: Jail apache-auth triggered 5 time(s) for 109.202.99.36.
[Sat Jan 04 19:55:01.678739 2025] [authz_core:error] [pid 426077] [client 109.202.99.36:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/user_secrets.yml [Sat Jan 04 19:55:01.679280 2025] [authz_core:error] [pid 426000] [client 109.202.99.36:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.aws [Sat Jan 04 19:55:01.679794 2025] [authz_core:error] [pid 649872] [client 109.202.99.36:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.env [Sat Jan 04 19:55:02.871144 2025] [authz_core:error] [pid 686540] [client 109.202.99.36:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.kube [Sat Jan 04 19:55:03.872944 2025] [authz_core:error] [pid 686557] [client 109.202.99.36:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.git ... show less |
Brute-Force Web App Attack | |
![]() |
[Fail2Ban]: Jail apache-fakegooglebot triggered 1 time(s) for 195.178.110.164.
195.178.110.164 ... show more[Fail2Ban]: Jail apache-fakegooglebot triggered 1 time(s) for 195.178.110.164.
195.178.110.164 - - [04/Jan/2025:07:33:16 +0100] "GET / HTTP/1.1" 403 3023 "-" "Mozilla/5.0 (iPhone; U; CPU iPhone OS) (compatible; Googlebot-Mobile/2.1; http://www.google.com/bot.html)" ... show less |
Bad Web Bot Web App Attack | |
![]() |
[Fail2Ban]: Jail apache-auth triggered 5 time(s) for 2a01:239:279:8600::1:0.
[Sat Jan 04 00:46 ... show more[Fail2Ban]: Jail apache-auth triggered 5 time(s) for 2a01:239:279:8600::1:0.
[Sat Jan 04 00:46:53.762762 2025] [authz_core:error] [pid 426130] [client 2a01:239:279:8600::1:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.env [Sat Jan 04 00:46:55.212135 2025] [authz_core:error] [pid 426133] [client 2a01:239:279:8600::1:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.env.local [Sat Jan 04 00:46:55.212135 2025] [authz_core:error] [pid 426133] [client 2a01:239:279:8600::1:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.env.local [Sat Jan 04 00:47:00.347505 2025] [authz_core:error] [pid 426077] [client 2a01:239:279:8600::1:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.env.backup ... show less |
Brute-Force Web App Attack | |
![]() |
[Fail2Ban]: Jail apache-auth triggered 5 time(s) for 164.90.228.79.
[Sat Jan 04 00:42:21.21874 ... show more[Fail2Ban]: Jail apache-auth triggered 5 time(s) for 164.90.228.79.
[Sat Jan 04 00:42:21.218746 2025] [authz_core:error] [pid 426000] [client 164.90.228.79:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.vscode [Sat Jan 04 00:42:24.077051 2025] [authz_core:error] [pid 416780] [client 164.90.228.79:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/server-status [Sat Jan 04 00:42:24.344601 2025] [authz_core:error] [pid 416779] [client 164.90.228.79:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.DS_Store [Sat Jan 04 00:42:25.225545 2025] [authz_core:error] [pid 426071] [client 164.90.228.79:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.env [Sat Jan 04 00:42:26.227850 2025] [authz_core:error] [pid 426076] [client 164.90.228.79:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.git ... show less |
Brute-Force Web App Attack | |
![]() |
[Fail2Ban]: Jail apache-auth triggered 5 time(s) for 207.154.197.113.
[Sat Jan 04 00:42:22.220 ... show more[Fail2Ban]: Jail apache-auth triggered 5 time(s) for 207.154.197.113.
[Sat Jan 04 00:42:22.220286 2025] [authz_core:error] [pid 426004] [client 207.154.197.113:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.vscode [Sat Jan 04 00:42:24.086247 2025] [authz_core:error] [pid 416781] [client 207.154.197.113:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/server-status [Sat Jan 04 00:42:24.261301 2025] [authz_core:error] [pid 416858] [client 207.154.197.113:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.DS_Store [Sat Jan 04 00:42:24.297194 2025] [authz_core:error] [pid 426007] [client 207.154.197.113:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.env [Sat Jan 04 00:42:24.418493 2025] [authz_core:error] [pid 425987] [client 207.154.197.113:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.git ... show less |
Brute-Force Web App Attack | |
![]() |
[Fail2Ban]: Jail apache-auth triggered 5 time(s) for 2a01:239:279:8600::1:0.
[Fri Jan 03 14:28 ... show more[Fail2Ban]: Jail apache-auth triggered 5 time(s) for 2a01:239:279:8600::1:0.
[Fri Jan 03 14:28:00.225826 2025] [authz_core:error] [pid 280815] [client 2a01:239:279:8600::1:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.env [Fri Jan 03 14:28:00.613963 2025] [authz_core:error] [pid 305349] [client 2a01:239:279:8600::1:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.env.local [Fri Jan 03 14:28:04.080295 2025] [authz_core:error] [pid 347568] [client 2a01:239:279:8600::1:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.env.backup [Fri Jan 03 14:28:04.474366 2025] [authz_core:error] [pid 347569] [client 2a01:239:279:8600::1:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.env.save [Fri Jan 03 14:28:05.770375 2025] [authz_core:error] [pid 347571] [client 2a01:239:279:8600::1:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/core/.env ... show less |
Brute-Force Web App Attack | |
![]() |
[Fail2Ban]: Jail sshd triggered 2 time(s) for 193.31.30.132.
2025-01-02T17:08:53.563764+01:00 ... show more[Fail2Ban]: Jail sshd triggered 2 time(s) for 193.31.30.132.
2025-01-02T17:08:53.563764+01:00 - sshd[251482]: Unable to negotiate with 193.31.30.132 port 57302: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] ... show less |
Brute-Force SSH | |
![]() |
[Fail2Ban]: Jail apache-auth triggered 5 time(s) for 179.43.161.42.
[Wed Jan 01 19:56:58.80434 ... show more[Fail2Ban]: Jail apache-auth triggered 5 time(s) for 179.43.161.42.
[Wed Jan 01 19:56:58.804349 2025] [authz_core:error] [pid 146390] [client 179.43.161.42:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.git-credentials [Wed Jan 01 19:59:47.971778 2025] [authz_core:error] [pid 64491] [client 179.43.161.42:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.aws [Wed Jan 01 20:01:59.779244 2025] [authz_core:error] [pid 146395] [client 179.43.161.42:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.ssh [Wed Jan 01 20:03:25.765708 2025] [authz_core:error] [pid 146394] [client 179.43.161.42:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.git-ftp-include [Wed Jan 01 20:07:19.761683 2025] [authz_core:error] [pid 64491] [client 179.43.161.42:0] AH01630: client denied by server configuration: /var/www/html/-_[redacted]/.env.local ... show less |
Brute-Force Web App Attack | |
![]() |
[Fail2Ban]: Jail sshd triggered 3 time(s) for 67.205.142.48.
2024-12-30T11:44:15.197642+01:00 ... show more[Fail2Ban]: Jail sshd triggered 3 time(s) for 67.205.142.48.
2024-12-30T11:44:15.197642+01:00 - sshd[998985]: Invalid user www from 67.205.142.48 port 54172 2024-12-30T11:44:15.285990+01:00 - sshd[998985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.142.48 2024-12-30T11:44:16.987742+01:00 - sshd[998985]: Failed password for invalid user www from 67.205.142.48 port 54172 ssh2 ... show less |
Brute-Force SSH | |
![]() |
[Fail2Ban]: Jail sshd triggered 3 time(s) for 193.31.30.132.
2024-12-29T17:08:28.473695+01:00 ... show more[Fail2Ban]: Jail sshd triggered 3 time(s) for 193.31.30.132.
2024-12-29T17:08:28.473695+01:00 - sshd[913807]: Unable to negotiate with 193.31.30.132 port 51394: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] 2024-12-29T17:08:38.572463+01:00 - sshd[913814]: Unable to negotiate with 193.31.30.132 port 59364: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] ... show less |
Brute-Force SSH | |
![]() |
[Fail2Ban]: Jail sshd triggered 3 time(s) for 67.205.142.48.
2024-12-28T11:42:18.928353+01:00 ... show more[Fail2Ban]: Jail sshd triggered 3 time(s) for 67.205.142.48.
2024-12-28T11:42:18.928353+01:00 - sshd[782905]: Connection closed by 67.205.142.48 port 52054 [preauth] 2024-12-28T11:43:03.934703+01:00 - sshd[782948]: Connection closed by 67.205.142.48 port 60682 [preauth] 2024-12-28T11:43:49.330099+01:00 - sshd[782975]: Connection closed by 67.205.142.48 port 48930 [preauth] ... show less |
Brute-Force SSH | |
![]() |
[Fail2Ban]: Jail sshd triggered 3 time(s) for 193.31.30.132.
2024-12-27T17:08:13.437621+01:00 ... show more[Fail2Ban]: Jail sshd triggered 3 time(s) for 193.31.30.132.
2024-12-27T17:08:13.437621+01:00 - sshd[697878]: Unable to negotiate with 193.31.30.132 port 39012: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] 2024-12-27T17:08:13.938027+01:00 - sshd[697880]: Unable to negotiate with 193.31.30.132 port 39568: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] 2024-12-27T17:08:18.912753+01:00 - sshd[697974]: Unable to negotiate with 193.31.30.132 port 43054: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] ... show less |
Brute-Force SSH | |
![]() |
[Fail2Ban]: Jail apache-fakegooglebot triggered 1 time(s) for 134.122.133.31.
134.122.133.31 - ... show more[Fail2Ban]: Jail apache-fakegooglebot triggered 1 time(s) for 134.122.133.31.
134.122.133.31 - - [26/Dec/2024:18:37:02 +0100] "GET /public/static/common/images/file.png HTTP/1.1" 404 671 "http://[redacted]" "Googlebot/2.1 (+http://www.google.com/bot.html)" ... show less |
Bad Web Bot Web App Attack | |
![]() |
[Fail2Ban]: Jail sshd triggered 3 time(s) for 154.213.187.41.
2024-12-24T11:06:01.075719+01:00 ... show more[Fail2Ban]: Jail sshd triggered 3 time(s) for 154.213.187.41.
2024-12-24T11:06:01.075719+01:00 - sshd[344915]: Failed password for root from 154.213.187.41 port 60812 ssh2 2024-12-24T11:32:57.913717+01:00 - sshd[346848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.213.187.41 user=root 2024-12-24T11:32:59.915655+01:00 - sshd[346848]: Failed password for root from 154.213.187.41 port 58656 ssh2 ... show less |
Brute-Force SSH | |
![]() |
[Fail2Ban]: Jail sshd triggered 0 time(s) for 154.213.187.41.
... |
Brute-Force SSH | |
![]() |
[Fail2Ban]: Jail apache-fakegooglebot triggered 1 time(s) for 14.128.63.60.
14.128.63.60 - - [ ... show more[Fail2Ban]: Jail apache-fakegooglebot triggered 1 time(s) for 14.128.63.60.
14.128.63.60 - - [19/Dec/2024:18:55:48 +0100] "GET /statics/images/admin_img/logo_1.gif HTTP/1.1" 404 670 "http://[redacted]" "Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" ... show less |
Bad Web Bot Web App Attack | |
![]() |
[Fail2Ban]: Jail apache-fakegooglebot triggered 1 time(s) for 87.120.115.119.
87.120.115.119 - ... show more[Fail2Ban]: Jail apache-fakegooglebot triggered 1 time(s) for 87.120.115.119.
87.120.115.119 - - [18/Dec/2024:06:31:26 +0100] "GET /_profiler/phpinfo HTTP/1.1" 403 3020 "-" "Mozilla/5.0 (compatible; Googlebot/2.1; http://www.google.com/bot.html)" ... show less |
Bad Web Bot Web App Attack | |
![]() |
[Fail2Ban]: Jail apache-fakegooglebot triggered 1 time(s) for 134.122.133.31.
134.122.133.31 - ... show more[Fail2Ban]: Jail apache-fakegooglebot triggered 1 time(s) for 134.122.133.31.
134.122.133.31 - - [17/Dec/2024:06:42:15 +0100] "GET / HTTP/1.1" 200 8002 "-" "Googlebot/2.1 (+http://www.googlebot.com/bot.html)" ... show less |
Bad Web Bot Web App Attack | |
![]() |
Brute-Force SSH | ||
![]() |
[Fail2Ban]: Jail sshd triggered 2 time(s) for 103.216.116.126.
2024-12-16T17:00:41.965573+01:0 ... show more[Fail2Ban]: Jail sshd triggered 2 time(s) for 103.216.116.126.
2024-12-16T17:00:41.965573+01:00 - sshd[3507946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.216.116.126 user=root 2024-12-16T17:00:44.103667+01:00 - sshd[3507946]: Failed password for root from 103.216.116.126 port 53936 ssh2 ... show less |
Brute-Force SSH | |
![]() |
[Fail2Ban]: Jail sshd triggered 2 time(s) for 103.216.116.126.
2024-12-16T14:19:51.957154+01:0 ... show more[Fail2Ban]: Jail sshd triggered 2 time(s) for 103.216.116.126.
2024-12-16T14:19:51.957154+01:00 - sshd[3473051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.216.116.126 user=root 2024-12-16T14:19:53.985311+01:00 - sshd[3473051]: Failed password for root from 103.216.116.126 port 45482 ssh2 ... show less |
Brute-Force SSH | |
![]() |
[Fail2Ban]: Jail sshd triggered 2 time(s) for 103.216.116.126.
2024-12-16T12:59:40.801233+01:0 ... show more[Fail2Ban]: Jail sshd triggered 2 time(s) for 103.216.116.126.
2024-12-16T12:59:40.801233+01:00 - sshd[3456101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.216.116.126 user=root 2024-12-16T12:59:43.363552+01:00 - sshd[3456101]: Failed password for root from 103.216.116.126 port 34298 ssh2 ... show less |
Brute-Force SSH | |
![]() |
[Fail2Ban]: Jail sshd triggered 4 time(s) for 103.216.116.126.
2024-12-16T12:18:31.996523+01:0 ... show more[Fail2Ban]: Jail sshd triggered 4 time(s) for 103.216.116.126.
2024-12-16T12:18:31.996523+01:00 - sshd[3447160]: Failed password for root from 103.216.116.126 port 42520 ssh2 2024-12-16T12:19:26.395266+01:00 - sshd[3447338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.216.116.126 user=root 2024-12-16T12:19:28.555711+01:00 - sshd[3447338]: Failed password for root from 103.216.116.126 port 55360 ssh2 2024-12-16T12:19:26.395266+01:00 - sshd[3447338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.216.116.126 user=root 2024-12-16T12:19:28.555711+01:00 - sshd[3447338]: Failed password for root from 103.216.116.126 port 55360 ssh2 ... show less |
Brute-Force SSH | |
![]() |
[Fail2Ban]: Jail sshd triggered 5 time(s) for 103.216.116.126.
2024-12-16T11:44:04.444951+01:0 ... show more[Fail2Ban]: Jail sshd triggered 5 time(s) for 103.216.116.126.
2024-12-16T11:44:04.444951+01:00 - sshd[3439527]: Failed password for root from 103.216.116.126 port 47070 ssh2 2024-12-16T11:44:58.628553+01:00 - sshd[3439797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.216.116.126 user=root 2024-12-16T11:45:00.557275+01:00 - sshd[3439797]: Failed password for root from 103.216.116.126 port 57898 ssh2 2024-12-16T11:45:53.780135+01:00 - sshd[3440075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.216.116.126 user=root 2024-12-16T11:45:55.924546+01:00 - sshd[3440075]: Failed password for root from 103.216.116.126 port 36898 ssh2 ... show less |
Brute-Force SSH |