⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.101
Server IP:
178.33.27.10
Server:
Linux cpanel.dev-unit.com 3.10.0-1160.119.1.el7.x86_64 #1 SMP Tue Jun 4 14:43:51 UTC 2024 x86_64
Server Software:
Apache/2.4.62 (Unix) OpenSSL/1.0.2k-fips
PHP Version:
8.2.25
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
usr
/
local
/
apache
/
domlogs
/
View File Name :
id.dev-unit.com.error.log
[Tue Feb 27 22:34:37.707057 2024] [authz_core:error] [pid 15994:tid 140019356366592] [client 167.71.185.75:33040] AH01630: client denied by server configuration: /home/id/public_html/server-status [Tue Feb 27 22:34:40.372298 2024] [authz_core:error] [pid 15992:tid 140019530958592] [client 162.243.184.251:33634] AH01630: client denied by server configuration: /home/id/public_html/server-status [Tue Feb 27 23:24:52.059000 2024] [:error] [pid 16171:tid 140019547744000] [client 197.58.6.140:50460] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/process/1627279445.jpg"] [unique_id "Zd5TJJc4C9k82MfTFab1LAAAAME"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:52.064949 2024] [:error] [pid 16171:tid 140019505780480] [client 197.58.6.140:50456] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/process/1627279524.jpg"] [unique_id "Zd5TJJc4C9k82MfTFab1LQAAAMY"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:52.071693 2024] [:error] [pid 15992:tid 140019415115520] [client 197.58.6.140:50462] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/process/1627279541.jpg"] [unique_id "Zd5TJN112r_oDetJ9iRhcAAAAAg"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:52.077360 2024] [:error] [pid 16171:tid 140019289224960] [client 197.58.6.140:50459] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/process/1627279606.jpg"] [unique_id "Zd5TJJc4C9k82MfTFab1LgAAANc"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:53.177192 2024] [:error] [pid 16171:tid 140019423508224] [client 197.58.6.140:50459] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/user/162739662810 220x220.png"] [unique_id "Zd5TJZc4C9k82MfTFab1LwAAAMc"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:53.194441 2024] [:error] [pid 15992:tid 140019406722816] [client 197.58.6.140:50462] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/user/1627281726thumb-4.jpg"] [unique_id "Zd5TJd112r_oDetJ9iRhcQAAAAk"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:53.199881 2024] [:error] [pid 16171:tid 140019539351296] [client 197.58.6.140:50456] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/user/162737889801 220x220.jpg"] [unique_id "Zd5TJZc4C9k82MfTFab1MAAAAMI"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:53.757904 2024] [:error] [pid 16171:tid 140019373152000] [client 197.58.6.140:50456] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/user/162738555302 220x220.jpg"] [unique_id "Zd5TJZc4C9k82MfTFab1MQAAAM0"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.092027 2024] [:error] [pid 16171:tid 140019314403072] [client 197.58.6.140:50456] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/testimonials/1627201214.jpg"] [unique_id "Zd5TJ5c4C9k82MfTFab1MgAAANQ"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.097525 2024] [:error] [pid 15992:tid 140019398330112] [client 197.58.6.140:50462] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/testimonials/1627201257.jpg"] [unique_id "Zd5TJ9112r_oDetJ9iRhcgAAAAo"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.103046 2024] [:error] [pid 16171:tid 140019280832256] [client 197.58.6.140:50459] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/testimonials/1627201326.jpg"] [unique_id "Zd5TJ5c4C9k82MfTFab1MwAAANg"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.189298 2024] [:error] [pid 16171:tid 140019406722816] [client 197.58.6.140:50460] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/blogs/1627199423.jpg"] [unique_id "Zd5TJ5c4C9k82MfTFab1NAAAAMk"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.485770 2024] [:error] [pid 15992:tid 140019389937408] [client 197.58.6.140:50462] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/blogs/1627199343.jpg"] [unique_id "Zd5TJ9112r_oDetJ9iRhcwAAAAs"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.491637 2024] [:error] [pid 16171:tid 140019339581184] [client 197.58.6.140:50456] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/partners/1682510792.jpg"] [unique_id "Zd5TJ5c4C9k82MfTFab1NQAAANE"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.498186 2024] [:error] [pid 16171:tid 140019331188480] [client 197.58.6.140:50460] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/partners/1682510820.jpg"] [unique_id "Zd5TJ5c4C9k82MfTFab1NgAAANI"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.502885 2024] [:error] [pid 16171:tid 140019306010368] [client 197.58.6.140:50459] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/partners/1682510832.jpg"] [unique_id "Zd5TJ5c4C9k82MfTFab1NwAAANU"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.554134 2024] [:error] [pid 16171:tid 140019347973888] [client 197.58.6.140:50465] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/partners/1682510846.jpg"] [unique_id "Zd5TJ5c4C9k82MfTFab1OAAAANA"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.704927 2024] [:error] [pid 16171:tid 140019297617664] [client 197.58.6.140:50465] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/testimonials/1627201144.jpg"] [unique_id "Zd5TJ5c4C9k82MfTFab1OQAAANY"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:59.208568 2024] [:error] [pid 16171:tid 140019322795776] [client 197.58.6.140:50465] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/changelanguage/ar"] [unique_id "Zd5TK5c4C9k82MfTFab1OgAAANM"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:25:04.533523 2024] [:error] [pid 16171:tid 140019356366592] [client 197.58.6.140:50464] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/changelanguage/ar"] [unique_id "Zd5TMJc4C9k82MfTFab1OwAAAM8"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:25:10.793275 2024] [:error] [pid 16171:tid 140019539351296] [client 197.58.6.140:50467] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/"] [unique_id "Zd5TNpc4C9k82MfTFab1PAAAAMI"] [Tue Feb 27 23:25:30.427725 2024] [:error] [pid 16171:tid 140019398330112] [client 197.58.6.140:50466] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/"] [unique_id "Zd5TSpc4C9k82MfTFab1PQAAAMo"] [Tue Feb 27 23:25:30.427830 2024] [:error] [pid 16171:tid 140019398330112] [client 197.58.6.140:50466] [client 197.58.6.140] ModSecurity: Audit log: Failed to lock global mutex: Invalid argument [hostname "id.dev-unit.com"] [uri "/"] [unique_id "Zd5TSpc4C9k82MfTFab1PQAAAMo"] [Tue Feb 27 23:25:30.427927 2024] [:error] [pid 16171:tid 140019398330112] [client 197.58.6.140:50466] [client 197.58.6.140] ModSecurity: Audit log: Failed to unlock global mutex: Invalid argument [hostname "id.dev-unit.com"] [uri "/"] [unique_id "Zd5TSpc4C9k82MfTFab1PQAAAMo"] [Wed Feb 28 10:07:16.407416 2024] [core:error] [pid 27361:tid 140554021078784] [client 105.193.218.204:5241] Script timed out before returning headers: server.php, referer: https://id.dev-unit.com/admin/register/users?language=en [Wed Feb 28 12:26:58.231218 2024] [core:error] [pid 26908:tid 140553937151744] [client 105.193.218.204:5225] Script timed out before returning headers: server.php, referer: https://id.dev-unit.com/admin/register/user/details/90 [Wed Feb 28 12:28:01.655674 2024] [core:error] [pid 26909:tid 140554179524352] [client 105.193.218.204:5359] Script timed out before returning headers: server.php, referer: https://id.dev-unit.com/admin/register/user/details/90 [Wed Feb 28 12:28:12.204635 2024] [core:error] [pid 27361:tid 140553979115264] [client 105.193.218.204:5388] Script timed out before returning headers: server.php, referer: https://id.dev-unit.com/admin/register/user/details/90 [Wed Feb 28 19:58:26.944606 2024] [core:error] [pid 26910:tid 140554213095168] [client 197.58.6.140:58748] Script timed out before returning headers: server.php, referer: https://id.dev-unit.com/user/package/checkout/31 [Fri Mar 01 04:33:02.088425 2024] [:error] [pid 26728:tid 139644066813696] [client 196.221.247.5:60962] PHP Fatal error: Cannot use isset() on the result of an expression (you can use "null !== expression" instead) in /home/id/public_html/storage/framework/views/99b673df3334d5f79d851b179d98da7797fd15e3.php on line 80, referer: https://id.dev-unit.com/user/dashboard?language=en [Sat Mar 09 04:40:47.222848 2024] [core:error] [pid 14458:tid 139872782247680] [client 102.40.105.117:60279] AH00524: Handler for (null) returned invalid result code 70008, referer: https://id.dev-unit.com/user/home-page-text/edit?language=en [Sat Mar 09 04:54:09.363231 2024] [core:error] [pid 14867:tid 139872740284160] [client 102.40.105.117:60836] AH00524: Handler for (null) returned invalid result code 70008, referer: https://id.dev-unit.com/user/home-page-text/edit?language=en [Sat Mar 09 05:40:11.656694 2024] [core:error] [pid 14867:tid 139872731891456] [client 102.40.105.117:62068] AH00524: Handler for (null) returned invalid result code 70008, referer: https://id.dev-unit.com/user/home-page-text/edit?language=en [Mon Mar 18 21:34:52.519487 2024] [core:error] [pid 28345:tid 139979426625280] [client 41.239.215.46:64330] AH00524: Handler for (null) returned invalid result code 70008, referer: https://id.dev-unit.com/admin/introsection?language=en [Sat Apr 27 00:54:26.658672 2024] [authz_core:error] [pid 26755:tid 140560505427712] [client 64.23.218.208:53588] AH01630: client denied by server configuration: /home/id/public_html/server-status [Sat Apr 27 00:54:31.585780 2024] [authz_core:error] [pid 26755:tid 140560555783936] [client 159.89.174.87:49070] AH01630: client denied by server configuration: /home/id/public_html/server-status [Mon Jun 10 11:55:50.988454 2024] [core:error] [pid 7069:tid 140208854980352] [client 105.181.7.94:3426] Script timed out before returning headers: server.php, referer: https://id.dev-unit.com/admin/register/users?language=en [Wed Jun 26 00:53:20.260572 2024] [authz_core:error] [pid 19186:tid 140215665596160] [client 138.197.191.87:46758] AH01630: client denied by server configuration: /home/id/public_html/server-status [Wed Jun 26 00:53:20.431086 2024] [authz_core:error] [pid 8030:tid 140215448434432] [client 139.59.132.8:49062] AH01630: client denied by server configuration: /home/id/public_html/server-status [Sun Aug 25 00:53:18.869470 2024] [authz_core:error] [pid 5634:tid 139708944299776] [client 138.68.82.23:41532] AH01630: client denied by server configuration: /home/id/public_html/server-status [Sun Aug 25 00:53:19.156639 2024] [authz_core:error] [pid 5635:tid 139708952692480] [client 64.226.65.160:50952] AH01630: client denied by server configuration: /home/id/public_html/server-status [Thu Oct 24 00:53:44.380742 2024] [authz_core:error] [pid 3714:tid 139643127289600] [client 157.245.36.108:48674] AH01630: client denied by server configuration: /home/id/public_html/server-status [Thu Oct 24 00:53:44.563890 2024] [authz_core:error] [pid 4507:tid 139643194431232] [client 178.128.207.138:57994] AH01630: client denied by server configuration: /home/id/public_html/server-status [Thu Oct 24 18:46:11.935811 2024] [authz_host:error] [pid 26988:tid 140284468188928] [client 213.232.87.230:56383] AH01753: access check of 'localhost' to /server-status failed, reason: unable to get the remote host name [Thu Oct 24 18:46:11.935860 2024] [authz_core:error] [pid 26988:tid 140284468188928] [client 213.232.87.230:56383] AH01630: client denied by server configuration: /home/id/public_html/server-status [Sun Dec 22 00:54:43.812080 2024] [authz_core:error] [pid 26028:tid 140109986903808] [client 206.81.24.227:35940] AH01630: client denied by server configuration: /home/id/public_html/server-status [Sun Dec 22 00:54:44.067046 2024] [authz_core:error] [pid 25128:tid 140109928154880] [client 207.154.197.113:41496] AH01630: client denied by server configuration: /home/id/public_html/server-status [Sun Jan 19 03:39:02.485143 2025] [:error] [pid 3151:tid 139952356542208] [client 179.43.149.114:37602] Could not write to logfile: [Sun Jan 19 03:39:02.485185 2025] [:error] [pid 3151:tid 139952356542208] [client 179.43.149.114:37602] Printing message to stderr: [Sun Jan 19 03:39:02.485257 2025] [:error] [pid 3151:tid 139952356542208] [client 179.43.149.114:37602] [Sun Jan 19 03:39:02 2025] [info] Executing "/home/id/public_html/server.php" as UID 1004, GID 1004 [Sun Jan 19 03:39:02.485260 2025] [:error] [pid 3151:tid 139952356542208] [client 179.43.149.114:37602] [Sun Jan 19 03:39:02.953203 2025] [:error] [pid 2906:tid 139952272615168] [client 179.43.149.114:37612] Could not write to logfile: [Sun Jan 19 03:39:02.953248 2025] [:error] [pid 2906:tid 139952272615168] [client 179.43.149.114:37612] Printing message to stderr: [Sun Jan 19 03:39:02.953321 2025] [:error] [pid 2906:tid 139952272615168] [client 179.43.149.114:37612] [Sun Jan 19 03:39:02 2025] [info] Executing "/home/id/public_html/server.php" as UID 1004, GID 1004 [Sun Jan 19 03:39:02.953325 2025] [:error] [pid 2906:tid 139952272615168] [client 179.43.149.114:37612] [Sun Jan 19 03:39:03.338874 2025] [:error] [pid 3151:tid 139952348149504] [client 179.43.149.114:37628] Could not write to logfile: [Sun Jan 19 03:39:03.338915 2025] [:error] [pid 3151:tid 139952348149504] [client 179.43.149.114:37628] Printing message to stderr: [Sun Jan 19 03:39:03.338987 2025] [:error] [pid 3151:tid 139952348149504] [client 179.43.149.114:37628] [Sun Jan 19 03:39:03 2025] [info] Executing "/home/id/public_html/server.php" as UID 1004, GID 1004 [Sun Jan 19 03:39:03.338990 2025] [:error] [pid 3151:tid 139952348149504] [client 179.43.149.114:37628] [Sun Jan 19 03:56:59.463621 2025] [:error] [pid 2906:tid 139952289400576] [client 87.120.114.143:50121] Could not write to logfile: [Sun Jan 19 03:56:59.463663 2025] [:error] [pid 2906:tid 139952289400576] [client 87.120.114.143:50121] Printing message to stderr: [Sun Jan 19 03:56:59.463736 2025] [:error] [pid 2906:tid 139952289400576] [client 87.120.114.143:50121] [Sun Jan 19 03:56:59 2025] [info] Executing "/home/id/public_html/server.php" as UID 1004, GID 1004 [Sun Jan 19 03:56:59.463740 2025] [:error] [pid 2906:tid 139952289400576] [client 87.120.114.143:50121] [Sun Jan 19 03:56:59.906202 2025] [:error] [pid 2906:tid 139952281007872] [client 87.120.114.143:50121] Could not write to logfile: [Sun Jan 19 03:56:59.906244 2025] [:error] [pid 2906:tid 139952281007872] [client 87.120.114.143:50121] Printing message to stderr: [Sun Jan 19 03:56:59.906317 2025] [:error] [pid 2906:tid 139952281007872] [client 87.120.114.143:50121] [Sun Jan 19 03:56:59 2025] [info] Executing "/home/id/public_html/server.php" as UID 1004, GID 1004 [Sun Jan 19 03:56:59.906320 2025] [:error] [pid 2906:tid 139952281007872] [client 87.120.114.143:50121] [Sun Jan 19 03:57:00.091112 2025] [:error] [pid 2906:tid 139952272615168] [client 87.120.114.143:50121] Could not write to logfile: [Sun Jan 19 03:57:00.091157 2025] [:error] [pid 2906:tid 139952272615168] [client 87.120.114.143:50121] Printing message to stderr: [Sun Jan 19 03:57:00.091229 2025] [:error] [pid 2906:tid 139952272615168] [client 87.120.114.143:50121] [Sun Jan 19 03:57:00 2025] [info] Executing "/home/id/public_html/server.php" as UID 1004, GID 1004 [Sun Jan 19 03:57:00.091[Thu Feb 20 00:53:42.248681 2025] [authz_core:error] [pid 7194:tid 140056064915200] [client 46.101.111.185:35804] AH01630: client denied by server configuration: /home/id/public_html/server-status [Thu Feb 20 00:53:42.669365 2025] [authz_core:error] [pid 7194:tid 140055955810048] [client 64.227.70.2:56614] AH01630: client denied by server configuration: /home/id/public_html/server-status [Sat Feb 22 15:14:17.745135 2025] [authz_host:error] [pid 19672:tid 140092496668416] [client 213.232.87.228:38629] AH01753: access check of 'localhost' to /server-status failed, reason: unable to get the remote host name [Sat Feb 22 15:14:17.745162 2025] [authz_core:error] [pid 19672:tid 140092496668416] [client 213.232.87.228:38629] AH01630: client denied by server configuration: /home/id/public_html/server-status [Wed Mar 05 01:28:04.658671 2025] [core:error] [pid 7004:tid 140028969686784] [client 52.66.246.152:54400] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:09.819140 2025] [core:error] [pid 5673:tid 140028961294080] [client 52.66.246.152:54416] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:14.971950 2025] [core:error] [pid 7004:tid 140028919330560] [client 52.66.246.152:59808] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:20.127657 2025] [core:error] [pid 5672:tid 140029087184640] [client 52.66.246.152:59824] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:25.276499 2025] [core:error] [pid 5671:tid 140029087184640] [client 52.66.246.152:50068] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:30.422165 2025] [core:error] [pid 5673:tid 140029062006528] [client 52.66.246.152:50082] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:35.619662 2025] [core:error] [pid 7004:tid 140028952901376] [client 52.66.246.152:43834] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:40.781702 2025] [core:error] [pid 5672:tid 140029011650304] [client 52.66.246.152:43842] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:47.979948 2025] [core:error] [pid 5673:tid 140028994864896] [client 52.66.246.152:40224] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:53.119664 2025] [core:error] [pid 5673:tid 140029078791936] [client 52.66.246.152:36116] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:58.284571 2025] [core:error] [pid 7004:tid 140029028435712] [client 52.66.246.152:36128] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:03.429410 2025] [core:error] [pid 5672:tid 140029062006528] [client 52.66.246.152:41478] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:08.581545 2025] [core:error] [pid 7004:tid 140028978079488] [client 52.66.246.152:41494] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:15.795338 2025] [core:error] [pid 5673:tid 140029011650304] [client 52.66.246.152:56428] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:20.933988 2025] [core:error] [pid 5673:tid 140029036828416] [client 52.66.246.152:56444] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:26.080665 2025] [core:error] [pid 7004:tid 140028927723264] [client 52.66.246.152:42196] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:31.234251 2025] [core:error] [pid 7004:tid 140029011650304] [client 52.66.246.152:49722] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:43.630748 2025] [core:error] [pid 5672:tid 140028902545152] [client 52.66.246.152:50378] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:48.784731 2025] [core:error] [pid 5672:tid 140028986472192] [client 52.66.246.152:50382] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:53.937157 2025] [core:error] [pid 5673:tid 140029045221120] [client 52.66.246.152:59622] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:59.080130 2025] [core:error] [pid 5672:tid 140028961294080] [client 52.66.246.152:59632] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:30:04.229222 2025] [core:error] [pid 7004:tid 140029070399232] [client 52.66.246.152:32806] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Sun Apr 13 22:08:13.369187 2025] [:error] [pid 23721:tid 140047491733248] [client 141.98.11.115:60050] PHP Warning: Undefined variable $color2 in /home/id/public_html/public/assets/front/css/profile/theme5/base-color.php on line 17 [Sun Apr 13 22:08:15.482143 2025] [:error] [pid 8194:tid 140047533696768] [client 141.98.11.115:60052] PHP Warning: Undefined variable $color2 in /home/id/public_html/public/assets/front/css/profile/theme3/base-color.php on line 17 [Mon Apr 21 06:35:59.558999 2025] [core:error] [pid 1714:tid 140580906587904] [client 138.124.19.29:56061] AH00524: Handler for (null) returned invalid result code 70008 [Fri Jun 20 00:56:11.988681 2025] [authz_core:error] [pid 12637:tid 139735934924544] [client 207.154.212.47:47246] AH01630: client denied by server configuration: /home/id/public_html/server-status [Mon Jun 23 02:11:03.169685 2025] [core:error] [pid 23353:tid 140286525114112] [client 67.86.108.41:37014] Script timed out before returning headers: server.php [Mon Jun 30 02:04:24.713674 2025] [core:error] [pid 29226:tid 140563525326592] [client 3.80.243.0:56656] Script timed out before returning headers: server.php [Tue Aug 19 00:56:33.469961 2025] [authz_core:error] [pid 11686:tid 11721] [client 64.226.65.160:39810] AH01630: client denied by server configuration: /home/id/public_html/server-status [Tue Aug 19 00:56:33.725861 2025] [authz_core:error] [pid 11783:tid 11792] [client 206.81.24.227:39288] AH01630: client denied by server configuration: /home/id/public_html/server-status [Sat Aug 30 14:36:03.667651 2025] [:error] [pid 985:tid 1040] [client 161.97.181.43:56322] Could not write to logfile: [Sat Aug 30 14:36:03.667700 2025] [:error] [pid 985:tid 1040] [client 161.97.181.43:56322] Printing message to stderr: [Sat Aug 30 14:36:03.667772 2025] [:error] [pid 985:tid 1040] [client 161.97.181.43:56322] [Sat Aug 30 14:36:03 2025] [info] Executing "/home/id/public_html/server.php" as UID 1004, GID 1004 [Sat Aug 30 14:36:03.667776 2025] [:error] [pid 985:tid 1040] [client 161.97.181.43:56322] [Sat Aug 30 14:36:18.224881 2025] [:error] [pid 985:tid 1055] [client 161.97.181.43:57938] Could not write to logfile: [Sat Aug 30 14:36:18.224924 2025] [:error] [pid 985:tid 1055] [client 161.97.181.43:57938] Printing message to stderr: [Sat Aug 30 14:36:18.224998 2025] [:error] [pid 985:tid 1055] [client 161.97.181.43:57938] [Sat Aug 30 14:36:18 2025] [info] Executing "/home/id/public_html/server.php" as UID 1004, GID 1004 [Sat Aug 30 14:36:18.225002 2025] [:error] [pid 985:tid 1055] [client 161.97.181.43:57938] [Sat Aug 30 21:07:19.539433 2025] [:error] [pid 1139:tid 1163] [client 104.210.140.129:25232] Could not write to logfile: [Sat Aug 30 21:07:19.539475 2025] [:error] [pid 1139:tid 1163] [client 104.210.140.129:25232] Printing message to stderr: [Sat Aug 30 21:07:19.539546 2025] [:error] [pid 1139:tid 1163] [client 104.210.[Mon Sep 08 16:06:49.590847 2025] [core:error] [pid 31400:tid 31452] [client 20.171.207.190:47178] AH10244: invalid URI path (/assets/front/js/profile/theme6-8/%url%) [Mon Sep 08 17:06:37.522139 2025] [core:error] [pid 31400:tid 31433] [client 20.171.207.190:43714] AH10244: invalid URI path (/assets/front/js/%url%) [Thu Sep 11 21:06:54.529164 2025] [:error] [pid 15487:tid 15568] [client 52.169.206.229:2860] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/about.php [Sun Sep 28 00:22:22.624577 2025] [:error] [pid 26536:tid 26549] [client 103.102.46.171:54168] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/parx.php [Sun Sep 28 00:23:12.937423 2025] [:error] [pid 26722:tid 26801] [client 103.102.46.171:51847] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/about.php [Sun Sep 28 00:25:12.462777 2025] [:error] [pid 29154:tid 29205] [client 103.102.46.171:60844] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/parx.php [Sun Sep 28 11:06:19.865890 2025] [:error] [pid 28448:tid 28542] [client 47.82.11.155:46364] PHP Warning: Undefined variable $color in /home/id/public_html/public/assets/front/css/profile/common-base-color.php on line 9 [Sun Sep 28 11:07:16.958286 2025] [:error] [pid 28448:tid 28544] [client 47.82.11.76:44284] PHP Warning: Undefined variable $color in /home/id/public_html/public/assets/front/css/profile/base-color2.php on line 9 [Sun Sep 28 11:08:37.375941 2025] [:error] [pid 28689:tid 28712] [client 47.82.11.153:35176] PHP Warning: Undefined variable $color in /home/id/public_html/public/assets/front/css/profile/theme4/base-color.php on line 9 [Sun Sep 28 11:13:36.163783 2025] [:error] [pid 11885:tid 11895] [client 47.82.11.192:40942] PHP Warning: Undefined array key "color" in /home/id/public_html/public/assets/front/css/style-base-color.php on line 3 [Sun Sep 28 11:26:29.746618 2025] [:error] [pid 28449:tid 28536] [client 47.82.11.184:46978] PHP Warning: Undefined variable $color in /home/id/public_html/public/assets/front/css/profile/theme5/base-color.php on line 9 [Sun Sep 28 11:26:29.746737 2025] [:error] [pid 28449:tid 28536] [client 47.82.11.184:46978] PHP Warning: Undefined variable $color2 in /home/id/public_html/public/assets/front/css/profile/theme5/base-color.php on line 17 [Sun Sep 28 12:10:16.062736 2025] [:error] [pid 11885:tid 11901] [client 47.82.11.54:33232] PHP Warning: Undefined variable $color in /home/id/public_html/public/assets/front/css/profile/theme3/base-color.php on line 9 [Sun Sep 28 12:10:16.062850 2025] [:error] [pid 11885:tid 11901] [client 47.82.11.54:33232] PHP Warning: Undefined variable $color2 in /home/id/public_html/public/assets/front/css/profile/theme3/base-color.php on line 17 [Sun Sep 28 12:18:59.839798 2025] [:error] [pid 11885:tid 11900] [client 47.82.11.198:35170] PHP Warning: Undefined variable $color in /home/id/public_html/public/assets/front/css/profile/base-color1.php on line 9 [Fri Oct 03 00:40:04.062792 2025] [core:error] [pid 26229:tid 26281] [client 192.178.6.102:44239] Script timed out before returning headers: server.php [Tue Oct 07 23:50:01.815793 2025] [:error] [pid 22250:tid 22256] [client 172.190.142.176:18484] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/about.php [Sat Oct 11 16:45:50.956547 2025] [:error] [pid 19301:tid 19306] [client 172.190.142.176:24813] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/index.php [Sat Oct 11 16:45:53.394830 2025] [:error] [pid 19301:tid 19324] [client 172.190.142.176:24813] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/dropdown.php [Sun Oct 12 18:33:59.694976 2025] [:error] [pid 7133:tid 7147] [client 20.37.109.180:56249] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/about.php [Sat Oct 18 00:54:15.205495 2025] [authz_core:error] [pid 5108:tid 5200] [client 139.59.136.184:60946] AH01630: client denied by server configuration: /home/id/public_html/server-status [Sat Oct 18 00:54:15.372465 2025] [authz_core:error] [pid 5158:tid 5272] [client 207.154.197.113:46718] AH01630: client denied by server configuration: /home/id/public_html/server-status [Sat Oct 18 02:19:45.597581 2025] [core:error] [pid 3918:tid 4041] [client 20.171.207.45:59776] AH10244: invalid URI path (/assets/front/js/profile/theme6-8/%url%) [Sat Oct 18 02:21:03.937215 2025] [core:error] [pid 5158:tid 5263] [client 20.171.207.45:46058] AH10244: invalid URI path (/assets/front/js/%url%) [Sat Oct 18 02:56:02.878542 2025] [:error] [pid 4100:tid 4123] [client 172.190.142.176:16917] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/about.php [Sat Oct 25 12:49:06.754640 2025] [:error] [pid 8115:tid 8220] [client 52.169.13.133:17665] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/index.php [Sat Oct 25 12:49:08.505605 2025] [:error] [pid 8115:tid 8232] [client 52.169.13.133:17665] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/admin.php [Sun Oct 26 00:41:29.106438 2025] [core:error] [pid 8112:tid 8184] [client 48.210.30.73:6651] Script timed out before returning headers: server.php [Tue Oct 28 07:51:58.066968 2025] [:error] [pid 8235:tid 8248] [client 172.190.142.176:9537] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/dropdown.php [Wed Oct 29 20:05:07.961776 2025] [:error] [pid 25069:tid 25142] [client 74.176.42.231:47828] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/about.php [Fri Oct 31 20:37:44.163663 2025] [core:error] [pid 15531:tid 15557] [client 74.7.227.62:44216] AH10244: invalid URI path (/assets/front/js/profile/theme6-8/%url%) [Fri Oct 31 20:43:37.449908 2025] [core:error] [pid 15531:tid 15555] [client 74.7.227.62:60500] AH10244: invalid URI path (/assets/front/js/%url%) [Sat Nov 08 19:31:40.750637 2025] [:error] [pid 26899:tid 26946] [client 20.222.66.73:15559] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/mariju.php [Sat Nov 08 19:31:42.883139 2025] [:error] [pid 26730:tid 26824] [client 20.222.66.73:15599] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/index.php [Wed Nov 12 12:18:45.546098 2025] [:error] [pid 6575:tid 6589] [client 172.192.12.119:19445] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/about.php [Mon Nov 17 19:57:02.251801 2025] [:error] [pid 411:tid 439] [client 52.169.206.229:10270] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/mariju.php [Mon Nov 17 19:57:02.785087 2025] [:error] [pid 411:tid 464] [client 52.169.206.229:7095] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/index.php [Sat Dec 06 00:42:32.354538 2025] [core:error] [pid 637:tid 764] [client 172.190.142.176:43839] Script timed out before returning headers: server.php [Sat Dec 06 06:33:48.285607 2025] [:error] [pid 28201:tid 28214] [client 4.218.20.75:56480] File does not exist: /usr/local/apache/autossl_tmp/.well-known/acme-challenge/index.php