⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.19
Server IP:
178.33.27.10
Server:
Linux cpanel.dev-unit.com 3.10.0-1160.108.1.el7.x86_64 #1 SMP Thu Jan 25 16:17:31 UTC 2024 x86_64
Server Software:
Apache/2.4.57 (Unix) OpenSSL/1.0.2k-fips
PHP Version:
8.2.11
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
usr
/
local
/
apache
/
domlogs
/
View File Name :
id.dev-unit.com.error.log
[Tue Feb 27 22:34:37.707057 2024] [authz_core:error] [pid 15994:tid 140019356366592] [client 167.71.185.75:33040] AH01630: client denied by server configuration: /home/id/public_html/server-status [Tue Feb 27 22:34:40.372298 2024] [authz_core:error] [pid 15992:tid 140019530958592] [client 162.243.184.251:33634] AH01630: client denied by server configuration: /home/id/public_html/server-status [Tue Feb 27 23:24:52.059000 2024] [:error] [pid 16171:tid 140019547744000] [client 197.58.6.140:50460] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/process/1627279445.jpg"] [unique_id "Zd5TJJc4C9k82MfTFab1LAAAAME"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:52.064949 2024] [:error] [pid 16171:tid 140019505780480] [client 197.58.6.140:50456] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/process/1627279524.jpg"] [unique_id "Zd5TJJc4C9k82MfTFab1LQAAAMY"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:52.071693 2024] [:error] [pid 15992:tid 140019415115520] [client 197.58.6.140:50462] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/process/1627279541.jpg"] [unique_id "Zd5TJN112r_oDetJ9iRhcAAAAAg"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:52.077360 2024] [:error] [pid 16171:tid 140019289224960] [client 197.58.6.140:50459] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/process/1627279606.jpg"] [unique_id "Zd5TJJc4C9k82MfTFab1LgAAANc"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:53.177192 2024] [:error] [pid 16171:tid 140019423508224] [client 197.58.6.140:50459] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/user/162739662810 220x220.png"] [unique_id "Zd5TJZc4C9k82MfTFab1LwAAAMc"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:53.194441 2024] [:error] [pid 15992:tid 140019406722816] [client 197.58.6.140:50462] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/user/1627281726thumb-4.jpg"] [unique_id "Zd5TJd112r_oDetJ9iRhcQAAAAk"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:53.199881 2024] [:error] [pid 16171:tid 140019539351296] [client 197.58.6.140:50456] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/user/162737889801 220x220.jpg"] [unique_id "Zd5TJZc4C9k82MfTFab1MAAAAMI"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:53.757904 2024] [:error] [pid 16171:tid 140019373152000] [client 197.58.6.140:50456] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/user/162738555302 220x220.jpg"] [unique_id "Zd5TJZc4C9k82MfTFab1MQAAAM0"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.092027 2024] [:error] [pid 16171:tid 140019314403072] [client 197.58.6.140:50456] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/testimonials/1627201214.jpg"] [unique_id "Zd5TJ5c4C9k82MfTFab1MgAAANQ"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.097525 2024] [:error] [pid 15992:tid 140019398330112] [client 197.58.6.140:50462] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/testimonials/1627201257.jpg"] [unique_id "Zd5TJ9112r_oDetJ9iRhcgAAAAo"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.103046 2024] [:error] [pid 16171:tid 140019280832256] [client 197.58.6.140:50459] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/testimonials/1627201326.jpg"] [unique_id "Zd5TJ5c4C9k82MfTFab1MwAAANg"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.189298 2024] [:error] [pid 16171:tid 140019406722816] [client 197.58.6.140:50460] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/blogs/1627199423.jpg"] [unique_id "Zd5TJ5c4C9k82MfTFab1NAAAAMk"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.485770 2024] [:error] [pid 15992:tid 140019389937408] [client 197.58.6.140:50462] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/blogs/1627199343.jpg"] [unique_id "Zd5TJ9112r_oDetJ9iRhcwAAAAs"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.491637 2024] [:error] [pid 16171:tid 140019339581184] [client 197.58.6.140:50456] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/partners/1682510792.jpg"] [unique_id "Zd5TJ5c4C9k82MfTFab1NQAAANE"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.498186 2024] [:error] [pid 16171:tid 140019331188480] [client 197.58.6.140:50460] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/partners/1682510820.jpg"] [unique_id "Zd5TJ5c4C9k82MfTFab1NgAAANI"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.502885 2024] [:error] [pid 16171:tid 140019306010368] [client 197.58.6.140:50459] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/partners/1682510832.jpg"] [unique_id "Zd5TJ5c4C9k82MfTFab1NwAAANU"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.554134 2024] [:error] [pid 16171:tid 140019347973888] [client 197.58.6.140:50465] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/partners/1682510846.jpg"] [unique_id "Zd5TJ5c4C9k82MfTFab1OAAAANA"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:55.704927 2024] [:error] [pid 16171:tid 140019297617664] [client 197.58.6.140:50465] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/assets/front/img/testimonials/1627201144.jpg"] [unique_id "Zd5TJ5c4C9k82MfTFab1OQAAANY"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:24:59.208568 2024] [:error] [pid 16171:tid 140019322795776] [client 197.58.6.140:50465] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/changelanguage/ar"] [unique_id "Zd5TK5c4C9k82MfTFab1OgAAANM"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:25:04.533523 2024] [:error] [pid 16171:tid 140019356366592] [client 197.58.6.140:50464] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/changelanguage/ar"] [unique_id "Zd5TMJc4C9k82MfTFab1OwAAAM8"], referer: https://id.dev-unit.com/ [Tue Feb 27 23:25:10.793275 2024] [:error] [pid 16171:tid 140019539351296] [client 197.58.6.140:50467] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/"] [unique_id "Zd5TNpc4C9k82MfTFab1PAAAAMI"] [Tue Feb 27 23:25:30.427725 2024] [:error] [pid 16171:tid 140019398330112] [client 197.58.6.140:50466] [client 197.58.6.140] ModSecurity: Access denied with code 403 (phase 2). Pattern match "([\\\\~\\\\!\\\\@\\\\#\\\\$\\\\%\\\\^\\\\&\\\\*\\\\(\\\\)\\\\-\\\\+\\\\=\\\\{\\\\}\\\\[\\\\]\\\\|\\\\:\\\\;\\"\\\\'\\\\\\xc2\\xb4\\\\\\xe2\\x80\\x99\\\\\\xe2\\x80\\x98\\\\`\\\\<\\\\>].*?){8,}" at REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70. [file "/usr/local/apache/modsecurity-owasp-old/base_rules/modsecurity_crs_41_sql_injection_attacks.conf"] [line "157"] [id "981172"] [rev "2"] [msg "Restricted SQL Character Anomaly Detection Alert - Total # of special characters exceeded"] [data "Matched Data: : found within REQUEST_COOKIES:twk_uuid_63f739444247f20fefe22e70: {\\x22uuid\\x22:\\x221.Sws8vWgSO8iArb1eSWLkYCc1FKABCTBpunovGr34YMLf9ejKYCttrj14f6Ljl2CfibTcsrKvswRQwhHKqVFObRIT2B2r25vQtSfOuT76tRBiOMipMI9NX\\x22,\\x22version\\x22:3,\\x22domain\\x22:\\x22dev-unit.com\\x22,\\x22ts\\x22:1709069088017}"] [ver "OWASP_CRS/2.2.9"] [maturity "9"] [accuracy "8"] [tag "OWASP_CRS/WEB_ATTACK/SQL_INJECTION"] [hostname "id.dev-unit.com"] [uri "/"] [unique_id "Zd5TSpc4C9k82MfTFab1PQAAAMo"] [Tue Feb 27 23:25:30.427830 2024] [:error] [pid 16171:tid 140019398330112] [client 197.58.6.140:50466] [client 197.58.6.140] ModSecurity: Audit log: Failed to lock global mutex: Invalid argument [hostname "id.dev-unit.com"] [uri "/"] [unique_id "Zd5TSpc4C9k82MfTFab1PQAAAMo"] [Tue Feb 27 23:25:30.427927 2024] [:error] [pid 16171:tid 140019398330112] [client 197.58.6.140:50466] [client 197.58.6.140] ModSecurity: Audit log: Failed to unlock global mutex: Invalid argument [hostname "id.dev-unit.com"] [uri "/"] [unique_id "Zd5TSpc4C9k82MfTFab1PQAAAMo"] [Wed Feb 28 10:07:16.407416 2024] [core:error] [pid 27361:tid 140554021078784] [client 105.193.218.204:5241] Script timed out before returning headers: server.php, referer: https://id.dev-unit.com/admin/register/users?language=en [Wed Feb 28 12:26:58.231218 2024] [core:error] [pid 26908:tid 140553937151744] [client 105.193.218.204:5225] Script timed out before returning headers: server.php, referer: https://id.dev-unit.com/admin/register/user/details/90 [Wed Feb 28 12:28:01.655674 2024] [core:error] [pid 26909:tid 140554179524352] [client 105.193.218.204:5359] Script timed out before returning headers: server.php, referer: https://id.dev-unit.com/admin/register/user/details/90 [Wed Feb 28 12:28:12.204635 2024] [core:error] [pid 27361:tid 140553979115264] [client 105.193.218.204:5388] Script timed out before returning headers: server.php, referer: https://id.dev-unit.com/admin/register/user/details/90 [Wed Feb 28 19:58:26.944606 2024] [core:error] [pid 26910:tid 140554213095168] [client 197.58.6.140:58748] Script timed out before returning headers: server.php, referer: https://id.dev-unit.com/user/package/checkout/31 [Fri Mar 01 04:33:02.088425 2024] [:error] [pid 26728:tid 139644066813696] [client 196.221.247.5:60962] PHP Fatal error: Cannot use isset() on the result of an expression (you can use "null !== expression" instead) in /home/id/public_html/storage/framework/views/99b673df3334d5f79d851b179d98da7797fd15e3.php on line 80, referer: https://id.dev-unit.com/user/dashboard?language=en [Sat Mar 09 04:40:47.222848 2024] [core:error] [pid 14458:tid 139872782247680] [client 102.40.105.117:60279] AH00524: Handler for (null) returned invalid result code 70008, referer: https://id.dev-unit.com/user/home-page-text/edit?language=en [Sat Mar 09 04:54:09.363231 2024] [core:error] [pid 14867:tid 139872740284160] [client 102.40.105.117:60836] AH00524: Handler for (null) returned invalid result code 70008, referer: https://id.dev-unit.com/user/home-page-text/edit?language=en [Sat Mar 09 05:40:11.656694 2024] [core:error] [pid 14867:tid 139872731891456] [client 102.40.105.117:62068] AH00524: Handler for (null) returned invalid result code 70008, referer: https://id.dev-unit.com/user/home-page-text/edit?language=en [Mon Mar 18 21:34:52.519487 2024] [core:error] [pid 28345:tid 139979426625280] [client 41.239.215.46:64330] AH00524: Handler for (null) returned invalid result code 70008, referer: https://id.dev-unit.com/admin/introsection?language=en [Sat Apr 27 00:54:26.658672 2024] [authz_core:error] [pid 26755:tid 140560505427712] [client 64.23.218.208:53588] AH01630: client denied by server configuration: /home/id/public_html/server-status [Sat Apr 27 00:54:31.585780 2024] [authz_core:error] [pid 26755:tid 140560555783936] [client 159.89.174.87:49070] AH01630: client denied by server configuration: /home/id/public_html/server-status [Mon Jun 10 11:55:50.988454 2024] [core:error] [pid 7069:tid 140208854980352] [client 105.181.7.94:3426] Script timed out before returning headers: server.php, referer: https://id.dev-unit.com/admin/register/users?language=en [Wed Jun 26 00:53:20.260572 2024] [authz_core:error] [pid 19186:tid 140215665596160] [client 138.197.191.87:46758] AH01630: client denied by server configuration: /home/id/public_html/server-status [Wed Jun 26 00:53:20.431086 2024] [authz_core:error] [pid 8030:tid 140215448434432] [client 139.59.132.8:49062] AH01630: client denied by server configuration: /home/id/public_html/server-status [Sun Aug 25 00:53:18.869470 2024] [authz_core:error] [pid 5634:tid 139708944299776] [client 138.68.82.23:41532] AH01630: client denied by server configuration: /home/id/public_html/server-status [Sun Aug 25 00:53:19.156639 2024] [authz_core:error] [pid 5635:tid 139708952692480] [client 64.226.65.160:50952] AH01630: client denied by server configuration: /home/id/public_html/server-status [Thu Oct 24 00:53:44.380742 2024] [authz_core:error] [pid 3714:tid 139643127289600] [client 157.245.36.108:48674] AH01630: client denied by server configuration: /home/id/public_html/server-status [Thu Oct 24 00:53:44.563890 2024] [authz_core:error] [pid 4507:tid 139643194431232] [client 178.128.207.138:57994] AH01630: client denied by server configuration: /home/id/public_html/server-status [Thu Oct 24 18:46:11.935811 2024] [authz_host:error] [pid 26988:tid 140284468188928] [client 213.232.87.230:56383] AH01753: access check of 'localhost' to /server-status failed, reason: unable to get the remote host name [Thu Oct 24 18:46:11.935860 2024] [authz_core:error] [pid 26988:tid 140284468188928] [client 213.232.87.230:56383] AH01630: client denied by server configuration: /home/id/public_html/server-status [Sun Dec 22 00:54:43.812080 2024] [authz_core:error] [pid 26028:tid 140109986903808] [client 206.81.24.227:35940] AH01630: client denied by server configuration: /home/id/public_html/server-status [Sun Dec 22 00:54:44.067046 2024] [authz_core:error] [pid 25128:tid 140109928154880] [client 207.154.197.113:41496] AH01630: client denied by server configuration: /home/id/public_html/server-status [Sun Jan 19 03:39:02.485143 2025] [:error] [pid 3151:tid 139952356542208] [client 179.43.149.114:37602] Could not write to logfile: [Sun Jan 19 03:39:02.485185 2025] [:error] [pid 3151:tid 139952356542208] [client 179.43.149.114:37602] Printing message to stderr: [Sun Jan 19 03:39:02.485257 2025] [:error] [pid 3151:tid 139952356542208] [client 179.43.149.114:37602] [Sun Jan 19 03:39:02 2025] [info] Executing "/home/id/public_html/server.php" as UID 1004, GID 1004 [Sun Jan 19 03:39:02.485260 2025] [:error] [pid 3151:tid 139952356542208] [client 179.43.149.114:37602] [Sun Jan 19 03:39:02.953203 2025] [:error] [pid 2906:tid 139952272615168] [client 179.43.149.114:37612] Could not write to logfile: [Sun Jan 19 03:39:02.953248 2025] [:error] [pid 2906:tid 139952272615168] [client 179.43.149.114:37612] Printing message to stderr: [Sun Jan 19 03:39:02.953321 2025] [:error] [pid 2906:tid 139952272615168] [client 179.43.149.114:37612] [Sun Jan 19 03:39:02 2025] [info] Executing "/home/id/public_html/server.php" as UID 1004, GID 1004 [Sun Jan 19 03:39:02.953325 2025] [:error] [pid 2906:tid 139952272615168] [client 179.43.149.114:37612] [Sun Jan 19 03:39:03.338874 2025] [:error] [pid 3151:tid 139952348149504] [client 179.43.149.114:37628] Could not write to logfile: [Sun Jan 19 03:39:03.338915 2025] [:error] [pid 3151:tid 139952348149504] [client 179.43.149.114:37628] Printing message to stderr: [Sun Jan 19 03:39:03.338987 2025] [:error] [pid 3151:tid 139952348149504] [client 179.43.149.114:37628] [Sun Jan 19 03:39:03 2025] [info] Executing "/home/id/public_html/server.php" as UID 1004, GID 1004 [Sun Jan 19 03:39:03.338990 2025] [:error] [pid 3151:tid 139952348149504] [client 179.43.149.114:37628] [Sun Jan 19 03:56:59.463621 2025] [:error] [pid 2906:tid 139952289400576] [client 87.120.114.143:50121] Could not write to logfile: [Sun Jan 19 03:56:59.463663 2025] [:error] [pid 2906:tid 139952289400576] [client 87.120.114.143:50121] Printing message to stderr: [Sun Jan 19 03:56:59.463736 2025] [:error] [pid 2906:tid 139952289400576] [client 87.120.114.143:50121] [Sun Jan 19 03:56:59 2025] [info] Executing "/home/id/public_html/server.php" as UID 1004, GID 1004 [Sun Jan 19 03:56:59.463740 2025] [:error] [pid 2906:tid 139952289400576] [client 87.120.114.143:50121] [Sun Jan 19 03:56:59.906202 2025] [:error] [pid 2906:tid 139952281007872] [client 87.120.114.143:50121] Could not write to logfile: [Sun Jan 19 03:56:59.906244 2025] [:error] [pid 2906:tid 139952281007872] [client 87.120.114.143:50121] Printing message to stderr: [Sun Jan 19 03:56:59.906317 2025] [:error] [pid 2906:tid 139952281007872] [client 87.120.114.143:50121] [Sun Jan 19 03:56:59 2025] [info] Executing "/home/id/public_html/server.php" as UID 1004, GID 1004 [Sun Jan 19 03:56:59.906320 2025] [:error] [pid 2906:tid 139952281007872] [client 87.120.114.143:50121] [Sun Jan 19 03:57:00.091112 2025] [:error] [pid 2906:tid 139952272615168] [client 87.120.114.143:50121] Could not write to logfile: [Sun Jan 19 03:57:00.091157 2025] [:error] [pid 2906:tid 139952272615168] [client 87.120.114.143:50121] Printing message to stderr: [Sun Jan 19 03:57:00.091229 2025] [:error] [pid 2906:tid 139952272615168] [client 87.120.114.143:50121] [Sun Jan 19 03:57:00 2025] [info] Executing "/home/id/public_html/server.php" as UID 1004, GID 1004 [Sun Jan 19 03:57:00.091[Thu Feb 20 00:53:42.248681 2025] [authz_core:error] [pid 7194:tid 140056064915200] [client 46.101.111.185:35804] AH01630: client denied by server configuration: /home/id/public_html/server-status [Thu Feb 20 00:53:42.669365 2025] [authz_core:error] [pid 7194:tid 140055955810048] [client 64.227.70.2:56614] AH01630: client denied by server configuration: /home/id/public_html/server-status [Sat Feb 22 15:14:17.745135 2025] [authz_host:error] [pid 19672:tid 140092496668416] [client 213.232.87.228:38629] AH01753: access check of 'localhost' to /server-status failed, reason: unable to get the remote host name [Sat Feb 22 15:14:17.745162 2025] [authz_core:error] [pid 19672:tid 140092496668416] [client 213.232.87.228:38629] AH01630: client denied by server configuration: /home/id/public_html/server-status [Wed Mar 05 01:28:04.658671 2025] [core:error] [pid 7004:tid 140028969686784] [client 52.66.246.152:54400] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:09.819140 2025] [core:error] [pid 5673:tid 140028961294080] [client 52.66.246.152:54416] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:14.971950 2025] [core:error] [pid 7004:tid 140028919330560] [client 52.66.246.152:59808] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:20.127657 2025] [core:error] [pid 5672:tid 140029087184640] [client 52.66.246.152:59824] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:25.276499 2025] [core:error] [pid 5671:tid 140029087184640] [client 52.66.246.152:50068] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:30.422165 2025] [core:error] [pid 5673:tid 140029062006528] [client 52.66.246.152:50082] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:35.619662 2025] [core:error] [pid 7004:tid 140028952901376] [client 52.66.246.152:43834] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:40.781702 2025] [core:error] [pid 5672:tid 140029011650304] [client 52.66.246.152:43842] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:47.979948 2025] [core:error] [pid 5673:tid 140028994864896] [client 52.66.246.152:40224] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:53.119664 2025] [core:error] [pid 5673:tid 140029078791936] [client 52.66.246.152:36116] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:28:58.284571 2025] [core:error] [pid 7004:tid 140029028435712] [client 52.66.246.152:36128] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:03.429410 2025] [core:error] [pid 5672:tid 140029062006528] [client 52.66.246.152:41478] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:08.581545 2025] [core:error] [pid 7004:tid 140028978079488] [client 52.66.246.152:41494] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:15.795338 2025] [core:error] [pid 5673:tid 140029011650304] [client 52.66.246.152:56428] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:20.933988 2025] [core:error] [pid 5673:tid 140029036828416] [client 52.66.246.152:56444] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:26.080665 2025] [core:error] [pid 7004:tid 140028927723264] [client 52.66.246.152:42196] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:31.234251 2025] [core:error] [pid 7004:tid 140029011650304] [client 52.66.246.152:49722] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:43.630748 2025] [core:error] [pid 5672:tid 140028902545152] [client 52.66.246.152:50378] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:48.784731 2025] [core:error] [pid 5672:tid 140028986472192] [client 52.66.246.152:50382] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:53.937157 2025] [core:error] [pid 5673:tid 140029045221120] [client 52.66.246.152:59622] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:29:59.080130 2025] [core:error] [pid 5672:tid 140028961294080] [client 52.66.246.152:59632] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Wed Mar 05 01:30:04.229222 2025] [core:error] [pid 7004:tid 140029070399232] [client 52.66.246.152:32806] AH00524: Handler for (null) returned invalid result code 70007, referer: https://www.google.com/ [Sun Apr 13 22:08:13.369187 2025] [:error] [pid 23721:tid 140047491733248] [client 141.98.11.115:60050] PHP Warning: Undefined variable $color2 in /home/id/public_html/public/assets/front/css/profile/theme5/base-color.php on line 17 [Sun Apr 13 22:08:15.482143 2025] [:error] [pid 8194:tid 140047533696768] [client 141.98.11.115:60052] PHP Warning: Undefined variable $color2 in /home/id/public_html/public/assets/front/css/profile/theme3/base-color.php on line 17 [Mon Apr 21 06:35:59.558999 2025] [core:error] [pid 1714:tid 140580906587904] [client 138.124.19.29:56061] AH00524: Handler for (null) returned invalid result code 70008