selvans.net webserver error log
File: /var/log/apache2/error.log
Report run time: Tue Jul 29 03:17:01 AM CDT 2025
[Tue Jul 29 03:16:52.078093 2025] [security2:error] [pid 272583:tid 272583] [client 38.68.134.13:60560] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/usr/share/modsecurity-crs/rules/RESPONSE-980-CORRELATION.conf"] [line "92"] [id "980130"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 25 - SQLI=0,XSS=0,RFI=0,LFI=20,RCE=5,PHPI=0,HTTP=0,SESS=0): individual paranoia level scores: 25, 0, 0, 0"] [ver "OWASP_CRS/3.3.7"] [tag "event-correlation"] [hostname "aselvan.selvans.net"] [uri "/error/HTTP_FORBIDDEN.html.var"] [unique_id "aIiDc4hh20z6LKKQJocEdwAAAAE"]
[Tue Jul 29 03:16:52.077711 2025] [security2:error] [pid 272583:tid 272583] [client 38.68.134.13:60560] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/usr/share/modsecurity-crs/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "94"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 25)"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "aselvan.selvans.net"] [uri "/"] [unique_id "aIiDc4hh20z6LKKQJocEdwAAAAE"]
[Tue Jul 29 03:16:52.077238 2025] [security2:error] [pid 272583:tid 272583] [client 38.68.134.13:60560] ModSecurity: Warning. Matched phrase "etc/passwd" at ARGS_NAMES:../../../../../../../etc/passwd. [file "/usr/share/modsecurity-crs/rules/REQUEST-932-APPLICATION-ATTACK-RCE.conf"] [line "501"] [id "932160"] [msg "Remote Command Execution: Unix Shell Code Found"] [data "Matched Data: etc/passwd found within ARGS_NAMES:../../../../../../../etc/passwd: ../../../../../../../etc/passwd"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-shell"] [tag "platform-unix"] [tag "attack-rce"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/152/248/88"] [tag "PCI/6.5.2"] [hostname "aselvan.selvans.net"] [uri "/"] [unique_id "aIiDc4hh20z6LKKQJocEdwAAAAE"]
[Tue Jul 29 03:16:52.076898 2025] [security2:error] [pid 272583:tid 272583] [client 38.68.134.13:60560] ModSecurity: Warning. Matched phrase "etc/passwd" at ARGS_NAMES:../../../../../../../etc/passwd. [file "/usr/share/modsecurity-crs/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "98"] [id "930120"] [msg "OS File Access Attempt"] [data "Matched Data: etc/passwd found within ARGS_NAMES:../../../../../../../etc/passwd: ../../../../../../../etc/passwd"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/255/153/126"] [tag "PCI/6.5.4"] [hostname "aselvan.selvans.net"] [uri "/"] [unique_id "aIiDc4hh20z6LKKQJocEdwAAAAE"]
[Tue Jul 29 03:16:52.076605 2025] [security2:error] [pid 272583:tid 272583] [client 38.68.134.13:60560] ModSecurity: Warning. Pattern match "(?:^|[\\\\/])\\\\.\\\\.(?:[\\\\/]|$)" at REQUEST_URI. [file "/usr/share/modsecurity-crs/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "72"] [id "930110"] [msg "Path Traversal Attack (/../)"] [data "Matched Data: /../ found within REQUEST_URI: /?../../../../../../../etc/passwd"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/255/153/126"] [hostname "aselvan.selvans.net"] [uri "/"] [unique_id "aIiDc4hh20z6LKKQJocEdwAAAAE"]
[Tue Jul 29 03:16:52.076459 2025] [security2:error] [pid 272583:tid 272583] [client 38.68.134.13:60560] ModSecurity: Warning. Pattern match "(?:^|[\\\\/])\\\\.\\\\.(?:[\\\\/]|$)" at REQUEST_URI. [file "/usr/share/modsecurity-crs/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "72"] [id "930110"] [msg "Path Traversal Attack (/../)"] [data "Matched Data: /../ found within REQUEST_URI: /?../../../../../../../etc/passwd"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/255/153/126"] [hostname "aselvan.selvans.net"] [uri "/"] [unique_id "aIiDc4hh20z6LKKQJocEdwAAAAE"]
[Tue Jul 29 03:16:52.076122 2025] [security2:error] [pid 272583:tid 272583] [client 38.68.134.13:60560] ModSecurity: Warning. Pattern match "(?i)(?:\\\\x5c|(?:%(?:c(?:0%(?:[2aq]f|5c|9v)|1%(?:[19p]c|8s|af))|2(?:5(?:c(?:0%25af|1%259c)|2f|5c)|%46|f)|(?:(?:f(?:8%8)?0%8|e)0%80%a|bg%q)f|%3(?:2(?:%(?:%6|4)6|F)|5%%63)|u(?:221[56]|002f|EFC8|F025)|1u|5c)|0x(?:2f|5c)|\\\\/))(?:%(?:(?:f(?:(?:c%80|8)%8)?0%8 ..." at REQUEST_URI_RAW. [file "/usr/share/modsecurity-crs/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "48"] [id "930100"] [msg "Path Traversal Attack (/../)"] [data "Matched Data: /?../ found within REQUEST_URI_RAW: /?../../../../../../../etc/passwd"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/255/153/126"] [hostname "aselvan.selvans.net"] [uri "/"] [unique_id "aIiDc4hh20z6LKKQJocEdwAAAAE"]
[Tue Jul 29 03:13:02.559126 2025] [security2:error] [pid 272588:tid 272588] [client 43.159.143.190:47100] ModSecurity: Warning. Pattern match "\\\\b(?:keep-alive|close),\\\\s?(?:keep-alive|close)\\\\b" at REQUEST_HEADERS:Connection. [file "/usr/share/modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "338"] [id "920210"] [msg "Multiple/Conflicting Connection Header Data Found"] [data "keep-alive, close"] [severity "WARNING"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [hostname "selvans.net"] [uri "/error/HTTP_BAD_REQUEST.html.var"] [unique_id "aIiCjrkxhzC_uxTxfq8zWwAAAAw"], referer: http://68.206.64.75:443
[Tue Jul 29 02:47:14.476052 2025] [access_compat:error] [pid 272642:tid 272642] [client 45.194.66.13:50600] AH01797: client denied by server configuration: /cgi-bin/luci
[Tue Jul 29 02:46:18.935770 2025] [security2:error] [pid 272587:tid 272587] [client 43.156.168.214:60638] ModSecurity: Warning. Pattern match "\\\\b(?:keep-alive|close),\\\\s?(?:keep-alive|close)\\\\b" at REQUEST_HEADERS:Connection. [file "/usr/share/modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "338"] [id "920210"] [msg "Multiple/Conflicting Connection Header Data Found"] [data "keep-alive, close"] [severity "WARNING"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [hostname "selvans.net"] [uri "/"] [unique_id "aIh8SpZo9IlGJRqCqDVVHQAAAAg"], referer: http://68.206.64.75
[Tue Jul 29 02:35:36.138085 2025] [access_compat:error] [pid 272588:tid 272588] [client 89.42.231.140:55404] AH01797: client denied by server configuration: /cgi-bin/luci, referer: http://68.206.64.75:80/cgi-bin/luci/;stok=/locale
[Tue Jul 29 02:26:20.940594 2025] [access_compat:error] [pid 275761:tid 275761] [client 45.194.66.13:58820] AH01797: client denied by server configuration: /cgi-bin/luci, referer: http://68.206.64.75:80/cgi-bin/luci/;stok=/locale
[Tue Jul 29 02:23:33.130614 2025] [security2:error] [pid 272584:tid 272584] [client 8.155.20.76:34206] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/usr/share/modsecurity-crs/rules/RESPONSE-980-CORRELATION.conf"] [line "92"] [id "980130"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 8 - SQLI=0,XSS=0,RFI=0,LFI=0,RCE=0,PHPI=0,HTTP=0,SESS=0): individual paranoia level scores: 8, 0, 0, 0"] [ver "OWASP_CRS/3.3.7"] [tag "event-correlation"] [hostname "api.ipapi.is"] [uri "/error/HTTP_FORBIDDEN.html.var"] [unique_id "aIh29OP_baf0FsdlE6j3PQAAAAc"]
[Tue Jul 29 02:23:33.128769 2025] [security2:error] [pid 272584:tid 272584] [client 8.155.20.76:34206] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/usr/share/modsecurity-crs/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "94"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 8)"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "api.ipapi.is"] [uri "/"] [unique_id "aIh29OP_baf0FsdlE6j3PQAAAAc"]
[Tue Jul 29 02:23:33.126993 2025] [security2:error] [pid 272584:tid 272584] [client 8.155.20.76:34206] ModSecurity: Warning. Match of "rx ^(?i:(?:[a-z]{3,10}\\\\s+(?:\\\\w{3,7}?://[\\\\w\\\\-\\\\./]*(?::\\\\d+)?)?/[^?#]*(?:\\\\?[^#\\\\s]*)?(?:#[\\\\S]*)?|connect (?:\\\\d{1,3}\\\\.){3}\\\\d{1,3}\\\\.?(?::\\\\d+)?|options \\\\*)\\\\s+[\\\\w\\\\./]+|get /[^?#]*(?:\\\\?[^#\\\\s]*)?(?:#[\\\\S]*)?)$" against "REQUEST_LINE" required. [file "/usr/share/modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "64"] [id "920100"] [msg "Invalid HTTP Request Line"] [data "CONNECT api.ipapi.is:443 HTTP/1.1"] [severity "WARNING"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [hostname "api.ipapi.is"] [uri "/"] [unique_id "aIh29OP_baf0FsdlE6j3PQAAAAc"]
[Tue Jul 29 02:23:33.126625 2025] [security2:error] [pid 272584:tid 272584] [client 8.155.20.76:34206] ModSecurity: Warning. Match of "within %{tx.allowed_methods}" against "REQUEST_METHOD" required. [file "/usr/share/modsecurity-crs/rules/REQUEST-911-METHOD-ENFORCEMENT.conf"] [line "44"] [id "911100"] [msg "Method is not allowed by policy"] [data "CONNECT"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272/220/274"] [tag "PCI/12.1"] [hostname "api.ipapi.is"] [uri "/"] [unique_id "aIh29OP_baf0FsdlE6j3PQAAAAc"]
[Tue Jul 29 01:56:50.066762 2025] [security2:error] [pid 272588:tid 272588] [client 101.33.80.42:56052] ModSecurity: Warning. Pattern match "\\\\b(?:keep-alive|close),\\\\s?(?:keep-alive|close)\\\\b" at REQUEST_HEADERS:Connection. [file "/usr/share/modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "338"] [id "920210"] [msg "Multiple/Conflicting Connection Header Data Found"] [data "keep-alive, close"] [severity "WARNING"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [hostname "selvans.net"] [uri "/"] [unique_id "aIhwsrkxhzC_uxTxfq8zVgAAAAw"], referer: http://www.selvans.net
[Tue Jul 29 01:53:56.991580 2025] [security2:error] [pid 272587:tid 272587] [client 135.119.88.104:42062] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/usr/share/modsecurity-crs/rules/RESPONSE-980-CORRELATION.conf"] [line "92"] [id "980130"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 8 - SQLI=0,XSS=0,RFI=0,LFI=0,RCE=0,PHPI=0,HTTP=0,SESS=0): individual paranoia level scores: 8, 0, 0, 0"] [ver "OWASP_CRS/3.3.7"] [tag "event-correlation"] [hostname "68.206.64.75"] [uri "/error/HTTP_FORBIDDEN.html.var"] [unique_id "aIhwBJZo9IlGJRqCqDVVGQAAAAg"]
[Tue Jul 29 01:53:56.990719 2025] [security2:error] [pid 272587:tid 272587] [client 135.119.88.104:42062] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/usr/share/modsecurity-crs/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "94"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 8)"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "68.206.64.75"] [uri "/developmentserver/metadatauploader"] [unique_id "aIhwBJZo9IlGJRqCqDVVGQAAAAg"]
[Tue Jul 29 01:53:56.988510 2025] [security2:error] [pid 272587:tid 272587] [client 135.119.88.104:42062] ModSecurity: Warning. Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/usr/share/modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "735"] [id "920350"] [msg "Host header is a numeric IP address"] [data "68.206.64.75"] [severity "WARNING"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "68.206.64.75"] [uri "/developmentserver/metadatauploader"] [unique_id "aIhwBJZo9IlGJRqCqDVVGQAAAAg"]
[Tue Jul 29 01:53:56.987860 2025] [security2:error] [pid 272587:tid 272587] [client 135.119.88.104:42062] ModSecurity: Warning. Matched phrase "zgrab" at REQUEST_HEADERS:User-Agent. [file "/usr/share/modsecurity-crs/rules/REQUEST-913-SCANNER-DETECTION.conf"] [line "55"] [id "913100"] [msg "Found User-Agent associated with security scanner"] [data "Matched Data: zgrab found within REQUEST_HEADERS:User-Agent: mozilla/5.0 zgrab/0.x"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-reputation-scanner"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/118/224/541/310"] [tag "PCI/6.5.10"] [hostname "68.206.64.75"] [uri "/developmentserver/metadatauploader"] [unique_id "aIhwBJZo9IlGJRqCqDVVGQAAAAg"]
[Tue Jul 29 01:31:04.889554 2025] [access_compat:error] [pid 272588:tid 272588] [client 45.194.66.13:41924] AH01797: client denied by server configuration: /cgi-bin/luci, referer: http://68.206.64.75:80/cgi-bin/luci/;stok=/locale
[Tue Jul 29 01:14:59.661169 2025] [security2:error] [pid 272642:tid 272642] [client 43.153.119.119:60910] ModSecurity: Warning. Pattern match "\\\\b(?:keep-alive|close),\\\\s?(?:keep-alive|close)\\\\b" at REQUEST_HEADERS:Connection. [file "/usr/share/modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "338"] [id "920210"] [msg "Multiple/Conflicting Connection Header Data Found"] [data "keep-alive, close"] [severity "WARNING"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [hostname "selvans.net"] [uri "/"] [unique_id "aIhm499savnSsg46sSXmywAAAAI"], referer: http://myip.selvans.net
[Tue Jul 29 01:12:34.915383 2025] [security2:error] [pid 272587:tid 272587] [client 66.240.236.116:46198] ModSecurity: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/usr/share/modsecurity-crs/rules/RESPONSE-980-CORRELATION.conf"] [line "92"] [id "980130"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 8 - SQLI=0,XSS=0,RFI=0,LFI=0,RCE=0,PHPI=0,HTTP=0,SESS=0): individual paranoia level scores: 8, 0, 0, 0"] [ver "OWASP_CRS/3.3.7"] [tag "event-correlation"] [hostname "68.206.64.75"] [uri "/error/HTTP_FORBIDDEN.html.var"] [unique_id "aIhmUpZo9IlGJRqCqDVVFgAAAAg"]
[Tue Jul 29 01:12:34.912066 2025] [security2:error] [pid 272587:tid 272587] [client 66.240.236.116:46198] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/usr/share/modsecurity-crs/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "94"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 8)"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "68.206.64.75"] [uri "/"] [unique_id "aIhmUpZo9IlGJRqCqDVVFgAAAAg"]
[Tue Jul 29 01:12:34.909893 2025] [security2:error] [pid 272587:tid 272587] [client 66.240.236.116:46198] ModSecurity: Warning. Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/usr/share/modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "735"] [id "920350"] [msg "Host header is a numeric IP address"] [data "68.206.64.75"] [severity "WARNING"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "68.206.64.75"] [uri "/"] [unique_id "aIhmUpZo9IlGJRqCqDVVFgAAAAg"]
[Tue Jul 29 01:12:34.909260 2025] [security2:error] [pid 272587:tid 272587] [client 66.240.236.116:46198] ModSecurity: Warning. Matched phrase "zgrab" at REQUEST_HEADERS:User-Agent. [file "/usr/share/modsecurity-crs/rules/REQUEST-913-SCANNER-DETECTION.conf"] [line "55"] [id "913100"] [msg "Found User-Agent associated with security scanner"] [data "Matched Data: zgrab found within REQUEST_HEADERS:User-Agent: mozilla/5.0 zgrab/0.x"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-reputation-scanner"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/118/224/541/310"] [tag "PCI/6.5.10"] [hostname "68.206.64.75"] [uri "/"] [unique_id "aIhmUpZo9IlGJRqCqDVVFgAAAAg"]
[Tue Jul 29 01:01:59.416557 2025] [access_compat:error] [pid 272642:tid 272642] [client 45.194.66.13:55534] AH01797: client denied by server configuration: /cgi-bin/luci
[Tue Jul 29 00:59:00.885538 2025] [access_compat:error] [pid 272584:tid 272584] [client 45.194.66.13:36256] AH01797: client denied by server configuration: /cgi-bin/luci, referer: http://68.206.64.75:80/cgi-bin/luci/;stok=/locale
[Tue Jul 29 00:19:26.232663 2025] [access_compat:error] [pid 272642:tid 272642] [client 45.194.66.13:58624] AH01797: client denied by server configuration: /cgi-bin/luci
[Tue Jul 29 00:17:53.649430 2025] [security2:error] [pid 272584:tid 272584] [client 35.203.210.168:58230] ModSecurity: Warning. Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/usr/share/modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "735"] [id "920350"] [msg "Host header is a numeric IP address"] [data "68.206.64.75:443"] [severity "WARNING"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "68.206.64.75"] [uri "/"] [unique_id "aIhZgeP_baf0FsdlE6j3NAAAAAc"]
[Tue Jul 29 00:16:02.425137 2025] [security2:error] [pid 272611:tid 272611] [client 87.255.194.135:61001] ModSecurity: Warning. Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/usr/share/modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "735"] [id "920350"] [msg "Host header is a numeric IP address"] [data "0.0.0.0"] [severity "WARNING"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "0.0.0.0"] [uri "/admin/assets/css/jquery-ui.css"] [unique_id "aIhZEhSuBm5hM3pvAcEvogAAAAA"]
[Tue Jul 29 00:08:47.692106 2025] [security2:error] [pid 272588:tid 272588] [client 43.153.10.13:34170] ModSecurity: Warning. Pattern match "\\\\b(?:keep-alive|close),\\\\s?(?:keep-alive|close)\\\\b" at REQUEST_HEADERS:Connection. [file "/usr/share/modsecurity-crs/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "338"] [id "920210"] [msg "Multiple/Conflicting Connection Header Data Found"] [data "keep-alive, close"] [severity "WARNING"] [ver "OWASP_CRS/3.3.7"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [hostname "selvans.net"] [uri "/"] [unique_id "aIhXX7kxhzC_uxTxfq8zSwAAAAw"], referer: http://arul.selvans.net
[Tue Jul 29 00:06:26.968298 2025] [access_compat:error] [pid 272583:tid 272583] [client 45.194.66.13:56018] AH01797: client denied by server configuration: /cgi-bin/luci, referer: http://68.206.64.75:80/cgi-bin/luci/;stok=/locale
Copyright © 1999-
selvans.net ,
selvansoft.com. All Rights Reserved.
Last modified: