ÿØÿà JFIF ÿþ; %PDF-1.5 %���� ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµùÕ5sLOšuY
Server IP : 157.90.209.209 / Your IP : 216.73.216.185 [ Web Server : Apache System : Linux hcomm124.dns-wk.info 4.18.0-553.64.1.el8_10.x86_64 #1 SMP Mon Jul 28 12:01:56 EDT 2025 x86_64 User : evidenciarevista ( 1049) PHP Version : 7.2.34 Disable Function : exec,passthru,shell_exec,system Domains : 216 Domains MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /proc/2717185/root/proc/self/root/usr/src/csf/ |
Upload File : |
From: root To: root Auto-Submitted: auto-generated X-XARF: PLAIN Content-Type: multipart/mixed; boundary="csf-[boundary]" MIME-Version: 1.0 Subject: abuse report about [ip] - [RFC3339] This is a multi-part message in MIME format. --csf-[boundary] Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=utf-8 The IP address [tip] was found attacking [service] on [hostname] [ipcount] times in the last [iptick] seconds. Attached is an X-ARF report (see http://www.xarf.org/specification.html) and the original log report that triggered this block. [abuseip] --csf-[boundary] Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename="report.txt" Content-Type: text/plain; charset=utf8; name="report.txt"; Reported-From: [reportedfrom] Report-ID: [reportedid] Category: abuse Report-Type: login-attack Service: [service] User-Agent: csf v[csfversion] Date: [RFC3339] Source: [ip] Source-Type: [iptype] Attachment: text/plain Schema-URL: https://download.configserver.com/abuse_login-attack_0.2.json --csf-[boundary] Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename="logfile.log" Content-Type: text/plain; charset=utf8; name="logfile.log"; [text] --csf-[boundary]--